Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Updated statement.exe

Overview

General Information

Sample Name:Updated statement.exe
Analysis ID:562440
MD5:ffde62febd6a85f3ecdd24d4fc1fbefc
SHA1:0c0bd6bbd865fff8e9983e51d9b4097857684a0e
SHA256:f8e99e2c7fab3cca06ccb78a7db5d2bfedd2bbcab16ff80a304b606e271cc9c8
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification

Classification

  • System is w10x64
  • Updated statement.exe (PID: 6000 cmdline: "C:\Users\user\Desktop\Updated statement.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • Updated statement.exe (PID: 3572 cmdline: C:\Users\user\Desktop\Updated statement.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • YZtXgX.exe (PID: 4104 cmdline: "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • YZtXgX.exe (PID: 5424 cmdline: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • YZtXgX.exe (PID: 4960 cmdline: "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • YZtXgX.exe (PID: 5828 cmdline: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1625897843", "Chat URL": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 52 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Updated statement.exe.3fa29f0.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Updated statement.exe.3fa29f0.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Updated statement.exe.3fa29f0.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x2ee81:$s1: get_kbok
                • 0x2f7c4:$s2: get_CHoo
                • 0x303fe:$s3: set_passwordIsSet
                • 0x2ec85:$s4: get_enableLog
                • 0x333a4:$s8: torbrowser
                • 0x31d80:$s10: logins
                • 0x3164e:$s11: credential
                • 0x2e0a8:$g1: get_Clipboard
                • 0x2e0b6:$g2: get_Keyboard
                • 0x2e0c3:$g3: get_Password
                • 0x2f663:$g4: get_CtrlKeyDown
                • 0x2f673:$g5: get_ShiftKeyDown
                • 0x2f684:$g6: get_AltKeyDown
                19.0.YZtXgX.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  19.0.YZtXgX.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 79 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Updated statement.exe, ProcessId: 3572, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\YZtXgX

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 19.0.YZtXgX.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1625897843", "Chat URL": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument"}
                    Source: YZtXgX.exe.4104.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendMessage"}
                    Source: Updated statement.exeReversingLabs: Detection: 53%
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeReversingLabs: Detection: 53%
                    Source: Updated statement.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJoe Sandbox ML: detected
                    Source: 19.0.YZtXgX.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.2.YZtXgX.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.2.Updated statement.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: Updated statement.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: Updated statement.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: XMLUt.pdb source: YZtXgX.exe, Updated statement.exe, YZtXgX.exe.5.dr
                    Source: Binary string: XMLUt.pdb8 source: Updated statement.exe, YZtXgX.exe.5.dr

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://RCEHNd.com
                    Source: Updated statement.exe, 00000005.00000002.573910185.000000000306F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com/
                    Source: Updated statement.exe, 00000005.00000002.571302685.0000000001145000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fPY8LulZKfW7HU.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentdocument-----
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4zl
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: YZtXgX.exe, 00000010.00000002.470019848.0000000000948000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Updated statement.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EF00400_2_07EF0040
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EF00060_2_07EF0006
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C947A05_2_02C947A0
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C946BA5_2_02C946BA
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C9D5E15_2_02C9D5E1
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_060365085_2_06036508
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_060390D85_2_060390D8
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_060371205_2_06037120
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_060368505_2_06036850
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_0603E1D05_2_0603E1D0
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE893A16_2_00BE893A
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE753C16_2_00BE753C
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE754016_2_00BE7540
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690000716_2_06900007
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690004016_2_06900040
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F8893A18_2_02F8893A
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F874FF18_2_02F874FF
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F8754018_2_02F87540
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F8752F18_2_02F8752F
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057062D418_2_057062D4
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0570709018_2_05707090
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0570523018_2_05705230
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0570323C18_2_0570323C
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0570522018_2_05705220
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572C64018_2_0572C640
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572C63018_2_0572C630
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572A06118_2_0572A061
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572A06818_2_0572A068
                    Source: Updated statement.exe, 00000000.00000000.300327958.0000000000A64000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.358157906.0000000007DB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hm,\\StringFileInfo\\000004B0\\OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.576116399.0000000006500000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.570990287.00000000010C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.569918123.0000000000984000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exeBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exeReversingLabs: Detection: 53%
                    Source: C:\Users\user\Desktop\Updated statement.exeFile read: C:\Users\user\Desktop\Updated statement.exe:Zone.IdentifierJump to behavior
                    Source: Updated statement.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Updated statement.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Updated statement.exe "C:\Users\user\Desktop\Updated statement.exe"
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Updated statement.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Updated statement.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@9/4@1/0
                    Source: C:\Users\user\Desktop\Updated statement.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: Updated statement.exe, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: Updated statement.exe, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: YZtXgX.exe.5.dr, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: YZtXgX.exe.5.dr, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Updated statement.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Updated statement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Updated statement.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Updated statement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: XMLUt.pdb source: YZtXgX.exe, Updated statement.exe, YZtXgX.exe.5.dr
                    Source: Binary string: XMLUt.pdb8 source: Updated statement.exe, YZtXgX.exe.5.dr

                    Data Obfuscation

                    barindex
                    Source: Updated statement.exe, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: YZtXgX.exe.5.dr, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: Updated statement.exe, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: YZtXgX.exe.5.dr, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EFC0D5 push FFFFFF8Bh; iretd 0_2_07EFC0D7
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06037AE8 push 8BF04589h; iretd 5_2_06037B74
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_06905799 push es; iretd 16_2_069057B4
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690575D push es; iretd 16_2_06905774
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690554F push es; ret 16_2_06905608
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690C0D5 push FFFFFF8Bh; iretd 16_2_0690C0D7
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690585D push es; ret 16_2_06905890
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057033E8 push 04418B05h; ret 18_2_05706083
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05706C60 push 20418B05h; ret 18_2_05706CD3
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05706CE0 push 0C418B05h; ret 18_2_05706D53
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057279B0 push ecx; ret 18_2_057279C5
                    Source: C:\Users\user\Desktop\Updated statement.exeFile created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Updated statement.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run YZtXgXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run YZtXgXJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Updated statement.exeFile opened: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 6056Thread sleep time: -33474s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 2528Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7056Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7024Thread sleep count: 2794 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7024Thread sleep count: 7057 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 7008Thread sleep time: -36513s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 3460Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5716Thread sleep time: -37134s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5344Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5380Thread sleep count: 2830 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5380Thread sleep count: 7004 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeWindow / User API: threadDelayed 2794Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeWindow / User API: threadDelayed 7057Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWindow / User API: threadDelayed 2830Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWindow / User API: threadDelayed 7004Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 33474Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 36513Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 37134Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Updated statement.exe, 00000005.00000002.571302685.0000000001145000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Updated statement.exeMemory written: C:\Users\user\Desktop\Updated statement.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeMemory written: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Users\user\Desktop\Updated statement.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Users\user\Desktop\Updated statement.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06035594 GetUserNameW,5_2_06035594

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    311
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer1
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Hidden Files and Directories
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Obfuscated Files or Information
                    DCSync113
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
                    Software Packing
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Updated statement.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Updated statement.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    19.0.YZtXgX.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    19.2.YZtXgX.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    5.2.Updated statement.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://blog.iandreev.com/0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://blog.iandreev.com0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    https://api.telegram.org4zl0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://RCEHNd.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://fPY8LulZKfW7HU.com0%Avira URL Cloudsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://DynDns.comDynDNSYZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://blog.iandreev.com/Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/?Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haUpdated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers?Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://blog.iandreev.comUpdated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentdocument-----Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org4zlUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://fontfabrik.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cnUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://RCEHNd.comYZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fonts.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://fPY8LulZKfW7HU.comUpdated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.urwpp.deDPleaseUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://api.telegram.orgUpdated statement.exe, 00000005.00000002.573910185.000000000306F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sakkal.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipUpdated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      No contacted IP infos
                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                      Analysis ID:562440
                                                      Start date:28.01.2022
                                                      Start time:21:41:06
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 11m 39s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Sample file name:Updated statement.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:25
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@9/4@1/0
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HDC Information:
                                                      • Successful, ratio: 1.6% (good quality ratio 1.2%)
                                                      • Quality average: 51.4%
                                                      • Quality standard deviation: 38.6%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 81
                                                      • Number of non-executed functions: 2
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 2.20.157.220
                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Execution Graph export aborted for target YZtXgX.exe, PID 5424 because there are no executed function
                                                      • Execution Graph export aborted for target YZtXgX.exe, PID 5828 because there are no executed function
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • VT rate limit hit for: Updated statement.exe
                                                      TimeTypeDescription
                                                      21:42:27API Interceptor605x Sleep call for process: Updated statement.exe modified
                                                      21:43:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run YZtXgX C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      21:43:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run YZtXgX C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      21:43:20API Interceptor105x Sleep call for process: YZtXgX.exe modified
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      api.telegram.orgHalkbank,pdf.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      updated statement.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      Shipping Documents.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      Payment Copy.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      8MnPvBzj15jLYOx.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      Invoice.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      _Liquidaci#Ufffdn Por Cargo Posterior al Vencimient.xlsxGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      QuotePDF.vbsGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      MV AMIS WEALTH CTM USD 40,000.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      MV AMIS WEALTH CTM USD 40,000.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      HWB 5795268743.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      XQTfgrwonfnZlkzLKSQhP.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      ZiVpfWoLp9.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      updated statement.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      ALDOM- ALD-797-R1.pdf.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      Draft Contract 25.01.2022.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      NEW P. O.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      FINAL PURCHASE ORDER LIST 20222.26.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      TANMAYI SHIPPING & LOGISTICS.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      98nMUVIMa7yoxmF.exeGet hashmaliciousBrowse
                                                      • 149.154.167.220
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):855552
                                                      Entropy (8bit):6.5637002407878935
                                                      Encrypted:false
                                                      SSDEEP:12288:5wdEo9tclaJTAjzmlj5fAY11gDt2OL3v2N:5wCoAls06lj5YAwwN
                                                      MD5:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      SHA1:0C0BD6BBD865FFF8E9983E51D9B4097857684A0E
                                                      SHA-256:F8E99E2C7FAB3CCA06CCB78A7DB5D2BFEDD2BBCAB16FF80A304B606E271CC9C8
                                                      SHA-512:3775118FDA25F6725CB36022EF76038702932EB2C11204C330ABD88BD0EAD8F4E5BAD59788982764E6504B04492C19EE2AEBCC45C72F22CDAD1F7D23C609D31C
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 54%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..a............................^.... ... ....@.. ....................................@.....................................K....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.sdata....... ......................@....rsrc........@......................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):6.5637002407878935
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:Updated statement.exe
                                                      File size:855552
                                                      MD5:ffde62febd6a85f3ecdd24d4fc1fbefc
                                                      SHA1:0c0bd6bbd865fff8e9983e51d9b4097857684a0e
                                                      SHA256:f8e99e2c7fab3cca06ccb78a7db5d2bfedd2bbcab16ff80a304b606e271cc9c8
                                                      SHA512:3775118fda25f6725cb36022ef76038702932eb2c11204c330abd88bd0ead8f4e5bad59788982764e6504b04492c19ee2aebcc45c72f22cdad1f7d23c609d31c
                                                      SSDEEP:12288:5wdEo9tclaJTAjzmlj5fAY11gDt2OL3v2N:5wCoAls06lj5YAwwN
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..a............................^.... ... ....@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x4d1f5e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x61F3C12D [Fri Jan 28 10:10:53 2022 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v4.0.30319
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      js 00007F2D9CCDBCD6h
                                                      push FFFFFFD7h
                                                      push esi
                                                      mov bh, C7h
                                                      call 00007F2DC0EE2E10h
                                                      out dx, al
                                                      into
                                                      mov ebp, 7C0FAFC1h
                                                      cmc
                                                      sub al, dh
                                                      xchg dword ptr [edi+13h], eax
                                                      inc esi
                                                      xor byte ptr [eax-02B96AFFh], ch
                                                      fcomp dword ptr [eax-08509680h]
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd1f100x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x598.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xd1ed10x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xcff640xd0000False0.514264620267data6.56915124336IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .sdata0xd20000x1e80x200False0.861328125data6.59839500395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xd40000x5980x600False0.418619791667data4.05644393161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xd60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0xd40a00x30cdata
                                                      RT_MANIFEST0xd43ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright 2016
                                                      Assembly Version1.0.0.0
                                                      InternalNameXMLUt.exe
                                                      FileVersion1.0.0.0
                                                      CompanyName
                                                      LegalTrademarks
                                                      Comments
                                                      ProductNameOthelloCS
                                                      ProductVersion1.0.0.0
                                                      FileDescriptionOthelloCS
                                                      OriginalFilenameXMLUt.exe
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 28, 2022 21:44:14.477529049 CET5265053192.168.2.38.8.8.8
                                                      Jan 28, 2022 21:44:14.495783091 CET53526508.8.8.8192.168.2.3
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jan 28, 2022 21:44:14.477529049 CET192.168.2.38.8.8.80xbd76Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jan 28, 2022 21:44:14.495783091 CET8.8.8.8192.168.2.30xbd76No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:21:42:07
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\Desktop\Updated statement.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Updated statement.exe"
                                                      Imagebase:0x990000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:21:42:29
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\Desktop\Updated statement.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\Updated statement.exe
                                                      Imagebase:0x8b0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      Target ID:16
                                                      Start time:21:43:14
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                                                      Imagebase:0xe0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 54%, ReversingLabs
                                                      Reputation:low

                                                      Target ID:18
                                                      Start time:21:43:22
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                                                      Imagebase:0xdd0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:19
                                                      Start time:21:43:22
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Imagebase:0x8e0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:20
                                                      Start time:21:43:30
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Imagebase:0x6d0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:10%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:147
                                                        Total number of Limit Nodes:4
                                                        execution_graph 6238 7ef84b2 6240 7ef8101 6238->6240 6239 7ef852b 6240->6239 6243 7ef8c29 6240->6243 6248 7ef8c38 6240->6248 6244 7ef8c38 6243->6244 6253 7ef8c88 6244->6253 6258 7ef8c98 6244->6258 6245 7ef8c80 6245->6240 6249 7ef8c52 6248->6249 6251 7ef8c88 12 API calls 6249->6251 6252 7ef8c98 12 API calls 6249->6252 6250 7ef8c80 6250->6240 6251->6250 6252->6250 6254 7ef8c98 6253->6254 6263 7ef90f8 6254->6263 6278 7ef90f1 6254->6278 6255 7ef8cf5 6255->6245 6259 7ef8cb5 6258->6259 6261 7ef90f8 12 API calls 6259->6261 6262 7ef90f1 12 API calls 6259->6262 6260 7ef8cf5 6260->6245 6261->6260 6262->6260 6264 7ef9112 6263->6264 6293 7ef98e7 6264->6293 6297 7ef92d8 6264->6297 6302 7ef9359 6264->6302 6307 7ef962b 6264->6307 6311 7ef967b 6264->6311 6319 7ef9c0b 6264->6319 6327 7ef94de 6264->6327 6332 7ef9740 6264->6332 6337 7ef91f1 6264->6337 6342 7ef91b2 6264->6342 6348 7ef9cb4 6264->6348 6356 7ef9a24 6264->6356 6265 7ef9140 6265->6255 6279 7ef90f8 6278->6279 6281 7ef94de 2 API calls 6279->6281 6282 7ef9c0b 4 API calls 6279->6282 6283 7ef967b 4 API calls 6279->6283 6284 7ef962b 2 API calls 6279->6284 6285 7ef9359 2 API calls 6279->6285 6286 7ef92d8 2 API calls 6279->6286 6287 7ef98e7 2 API calls 6279->6287 6288 7ef9a24 6 API calls 6279->6288 6289 7ef9cb4 4 API calls 6279->6289 6290 7ef91b2 2 API calls 6279->6290 6291 7ef91f1 2 API calls 6279->6291 6292 7ef9740 2 API calls 6279->6292 6280 7ef9140 6280->6255 6281->6280 6282->6280 6283->6280 6284->6280 6285->6280 6286->6280 6287->6280 6288->6280 6289->6280 6290->6280 6291->6280 6292->6280 6374 7ef7808 6293->6374 6378 7ef7801 6293->6378 6294 7ef9901 6299 7ef92e9 6297->6299 6298 7ef9307 6299->6298 6382 7ef79f8 6299->6382 6386 7ef79f0 6299->6386 6303 7ef9363 6302->6303 6305 7ef79f8 WriteProcessMemory 6303->6305 6306 7ef79f0 WriteProcessMemory 6303->6306 6304 7ef93a0 6305->6304 6306->6304 6390 7ef7ae8 6307->6390 6394 7ef7ae0 6307->6394 6308 7ef9652 6312 7ef9685 6311->6312 6398 7ef7938 6312->6398 6402 7ef7930 6312->6402 6313 7ef937f 6314 7ef93a0 6313->6314 6317 7ef79f8 WriteProcessMemory 6313->6317 6318 7ef79f0 WriteProcessMemory 6313->6318 6317->6314 6318->6314 6320 7ef9c14 6319->6320 6322 7ef94bc 6320->6322 6325 7ef7808 SetThreadContext 6320->6325 6326 7ef7801 SetThreadContext 6320->6326 6321 7ef9550 6321->6322 6406 7ef7758 6321->6406 6410 7ef7751 6321->6410 6325->6321 6326->6321 6328 7ef94f0 6327->6328 6329 7ef977b 6328->6329 6330 7ef7758 ResumeThread 6328->6330 6331 7ef7751 ResumeThread 6328->6331 6330->6329 6331->6329 6333 7ef974a 6332->6333 6335 7ef7758 ResumeThread 6333->6335 6336 7ef7751 ResumeThread 6333->6336 6334 7ef977b 6335->6334 6336->6334 6338 7ef91fb 6337->6338 6414 7ef7c74 6338->6414 6418 7ef7c80 6338->6418 6343 7ef91ed 6342->6343 6344 7ef91ba 6342->6344 6346 7ef7c74 CreateProcessA 6343->6346 6347 7ef7c80 CreateProcessA 6343->6347 6344->6265 6345 7ef9281 6346->6345 6347->6345 6349 7ef96a1 6348->6349 6351 7ef93a0 6348->6351 6352 7ef7938 VirtualAllocEx 6349->6352 6353 7ef7930 VirtualAllocEx 6349->6353 6350 7ef937f 6350->6351 6354 7ef79f8 WriteProcessMemory 6350->6354 6355 7ef79f0 WriteProcessMemory 6350->6355 6352->6350 6353->6350 6354->6351 6355->6351 6357 7ef9766 6356->6357 6358 7ef9a31 6356->6358 6372 7ef7758 ResumeThread 6357->6372 6373 7ef7751 ResumeThread 6357->6373 6359 7ef96a1 6358->6359 6360 7ef9a6c 6358->6360 6363 7ef9307 6358->6363 6368 7ef7938 VirtualAllocEx 6359->6368 6369 7ef7930 VirtualAllocEx 6359->6369 6361 7ef9b20 6360->6361 6360->6363 6366 7ef79f8 WriteProcessMemory 6360->6366 6367 7ef79f0 WriteProcessMemory 6360->6367 6361->6363 6364 7ef79f8 WriteProcessMemory 6361->6364 6365 7ef79f0 WriteProcessMemory 6361->6365 6362 7ef937f 6362->6363 6370 7ef79f8 WriteProcessMemory 6362->6370 6371 7ef79f0 WriteProcessMemory 6362->6371 6364->6363 6365->6363 6366->6361 6367->6361 6368->6362 6369->6362 6370->6363 6371->6363 6372->6363 6373->6363 6375 7ef784d SetThreadContext 6374->6375 6377 7ef7895 6375->6377 6377->6294 6379 7ef7808 SetThreadContext 6378->6379 6381 7ef7895 6379->6381 6381->6294 6383 7ef7a40 WriteProcessMemory 6382->6383 6385 7ef7a97 6383->6385 6385->6298 6387 7ef79f8 WriteProcessMemory 6386->6387 6389 7ef7a97 6387->6389 6389->6298 6391 7ef7b33 ReadProcessMemory 6390->6391 6393 7ef7b77 6391->6393 6393->6308 6395 7ef7ae8 ReadProcessMemory 6394->6395 6397 7ef7b77 6395->6397 6397->6308 6399 7ef7978 VirtualAllocEx 6398->6399 6401 7ef79b5 6399->6401 6401->6313 6403 7ef7938 VirtualAllocEx 6402->6403 6405 7ef79b5 6403->6405 6405->6313 6407 7ef7798 ResumeThread 6406->6407 6409 7ef77c9 6407->6409 6409->6322 6411 7ef7758 ResumeThread 6410->6411 6413 7ef77c9 6411->6413 6413->6322 6415 7ef7d09 CreateProcessA 6414->6415 6417 7ef7ecb 6415->6417 6417->6417 6419 7ef7d09 CreateProcessA 6418->6419 6421 7ef7ecb 6419->6421 6421->6421 6422 7efa0c0 6423 7efa24b 6422->6423 6425 7efa0e6 6422->6425 6425->6423 6426 7ef7194 6425->6426 6427 7efa340 PostMessageW 6426->6427 6428 7efa3ac 6427->6428 6428->6425

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 7ef7c74-7ef7d15 2 7ef7d4e-7ef7d6e 0->2 3 7ef7d17-7ef7d21 0->3 10 7ef7da7-7ef7dd6 2->10 11 7ef7d70-7ef7d7a 2->11 3->2 4 7ef7d23-7ef7d25 3->4 5 7ef7d48-7ef7d4b 4->5 6 7ef7d27-7ef7d31 4->6 5->2 8 7ef7d35-7ef7d44 6->8 9 7ef7d33 6->9 8->8 12 7ef7d46 8->12 9->8 17 7ef7e0f-7ef7ec9 CreateProcessA 10->17 18 7ef7dd8-7ef7de2 10->18 11->10 13 7ef7d7c-7ef7d7e 11->13 12->5 15 7ef7da1-7ef7da4 13->15 16 7ef7d80-7ef7d8a 13->16 15->10 19 7ef7d8e-7ef7d9d 16->19 20 7ef7d8c 16->20 31 7ef7ecb-7ef7ed1 17->31 32 7ef7ed2-7ef7f58 17->32 18->17 21 7ef7de4-7ef7de6 18->21 19->19 22 7ef7d9f 19->22 20->19 23 7ef7e09-7ef7e0c 21->23 24 7ef7de8-7ef7df2 21->24 22->15 23->17 26 7ef7df6-7ef7e05 24->26 27 7ef7df4 24->27 26->26 28 7ef7e07 26->28 27->26 28->23 31->32 42 7ef7f5a-7ef7f5e 32->42 43 7ef7f68-7ef7f6c 32->43 42->43 44 7ef7f60 42->44 45 7ef7f6e-7ef7f72 43->45 46 7ef7f7c-7ef7f80 43->46 44->43 45->46 47 7ef7f74 45->47 48 7ef7f82-7ef7f86 46->48 49 7ef7f90-7ef7f94 46->49 47->46 48->49 50 7ef7f88 48->50 51 7ef7fa6-7ef7fad 49->51 52 7ef7f96-7ef7f9c 49->52 50->49 53 7ef7faf-7ef7fbe 51->53 54 7ef7fc4 51->54 52->51 53->54 56 7ef7fc5 54->56 56->56
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07EF7EB6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: a49c3d8039bdd87925124a56fc356789c271d54021971bc9f76d88467e14f086
                                                        • Instruction ID: fd3eb1cd867e9b3285625aeac34b74601eb8a742d1fee27938f239b9a4d248d7
                                                        • Opcode Fuzzy Hash: a49c3d8039bdd87925124a56fc356789c271d54021971bc9f76d88467e14f086
                                                        • Instruction Fuzzy Hash: CCA18BB1D01219CFDB20CFA4CC40BEDBBB2BF49318F5485AAD909A7640DB749995CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 57 7ef7c80-7ef7d15 59 7ef7d4e-7ef7d6e 57->59 60 7ef7d17-7ef7d21 57->60 67 7ef7da7-7ef7dd6 59->67 68 7ef7d70-7ef7d7a 59->68 60->59 61 7ef7d23-7ef7d25 60->61 62 7ef7d48-7ef7d4b 61->62 63 7ef7d27-7ef7d31 61->63 62->59 65 7ef7d35-7ef7d44 63->65 66 7ef7d33 63->66 65->65 69 7ef7d46 65->69 66->65 74 7ef7e0f-7ef7ec9 CreateProcessA 67->74 75 7ef7dd8-7ef7de2 67->75 68->67 70 7ef7d7c-7ef7d7e 68->70 69->62 72 7ef7da1-7ef7da4 70->72 73 7ef7d80-7ef7d8a 70->73 72->67 76 7ef7d8e-7ef7d9d 73->76 77 7ef7d8c 73->77 88 7ef7ecb-7ef7ed1 74->88 89 7ef7ed2-7ef7f58 74->89 75->74 78 7ef7de4-7ef7de6 75->78 76->76 79 7ef7d9f 76->79 77->76 80 7ef7e09-7ef7e0c 78->80 81 7ef7de8-7ef7df2 78->81 79->72 80->74 83 7ef7df6-7ef7e05 81->83 84 7ef7df4 81->84 83->83 85 7ef7e07 83->85 84->83 85->80 88->89 99 7ef7f5a-7ef7f5e 89->99 100 7ef7f68-7ef7f6c 89->100 99->100 101 7ef7f60 99->101 102 7ef7f6e-7ef7f72 100->102 103 7ef7f7c-7ef7f80 100->103 101->100 102->103 104 7ef7f74 102->104 105 7ef7f82-7ef7f86 103->105 106 7ef7f90-7ef7f94 103->106 104->103 105->106 107 7ef7f88 105->107 108 7ef7fa6-7ef7fad 106->108 109 7ef7f96-7ef7f9c 106->109 107->106 110 7ef7faf-7ef7fbe 108->110 111 7ef7fc4 108->111 109->108 110->111 113 7ef7fc5 111->113 113->113
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07EF7EB6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 0c26b4c554d8651ff64b5ecc678d4c55d9bc7131e26702d5661cb9de85658f39
                                                        • Instruction ID: e35dfcc588497f399b31c9e8198de0793373f644bf2029921e4c654c241329af
                                                        • Opcode Fuzzy Hash: 0c26b4c554d8651ff64b5ecc678d4c55d9bc7131e26702d5661cb9de85658f39
                                                        • Instruction Fuzzy Hash: 83918CB1D01219CFDB20CFA8CC40BEEBBB6BF49318F54856AD909A7640DB749991CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 114 7ef79f0-7ef7a46 117 7ef7a48-7ef7a54 114->117 118 7ef7a56-7ef7a95 WriteProcessMemory 114->118 117->118 120 7ef7a9e-7ef7ace 118->120 121 7ef7a97-7ef7a9d 118->121 121->120
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07EF7A88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: c8d02e2cc655d48f2783fb6e2ee08ae60bc549088589c735e6197fbd9eda61c1
                                                        • Instruction ID: f89e3c87b97aa2b9189bd432e7f6d891f36ed5abd887f58326eb10986aebad56
                                                        • Opcode Fuzzy Hash: c8d02e2cc655d48f2783fb6e2ee08ae60bc549088589c735e6197fbd9eda61c1
                                                        • Instruction Fuzzy Hash: A8218BB19013099FCF10CFA9C881BEEBBF5FF48314F50882AE919A7640D7789944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 125 7ef79f8-7ef7a46 127 7ef7a48-7ef7a54 125->127 128 7ef7a56-7ef7a95 WriteProcessMemory 125->128 127->128 130 7ef7a9e-7ef7ace 128->130 131 7ef7a97-7ef7a9d 128->131 131->130
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07EF7A88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 4302fcbeaba4503ba807d756e2c7af7ffe334fa1e5685d56c481ce3cd04de110
                                                        • Instruction ID: f99d27ec064c361f7c801b67c1d6915fd0f307b5054620b57c0755c86068d627
                                                        • Opcode Fuzzy Hash: 4302fcbeaba4503ba807d756e2c7af7ffe334fa1e5685d56c481ce3cd04de110
                                                        • Instruction Fuzzy Hash: 292169B19013099FCF10CFA9C880BEEBBF5FF48314F50882AE919A7640D7789944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 135 7ef7ae0-7ef7b75 ReadProcessMemory 139 7ef7b7e-7ef7bae 135->139 140 7ef7b77-7ef7b7d 135->140 140->139
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07EF7B68
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: d5fb9d1aaddec07a83593ebfc931d033f1366a9cbdf52264106c6ee96f685b53
                                                        • Instruction ID: fcf7ecef7622777221dedda9ec0109f9f6d6e9aab653744dc43b8c74f69196e1
                                                        • Opcode Fuzzy Hash: d5fb9d1aaddec07a83593ebfc931d033f1366a9cbdf52264106c6ee96f685b53
                                                        • Instruction Fuzzy Hash: 672139B18002099FCB10CFA9C880AEEBBF5FF48314F54882AE519A7640D7389941CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 144 7ef7801-7ef7853 147 7ef7855-7ef7861 144->147 148 7ef7863-7ef7893 SetThreadContext 144->148 147->148 150 7ef789c-7ef78cc 148->150 151 7ef7895-7ef789b 148->151 151->150
                                                        APIs
                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 07EF7886
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: ContextThread
                                                        • String ID:
                                                        • API String ID: 1591575202-0
                                                        • Opcode ID: edfa937398291ec60fc4a5ed392b24bfb44c04815e4e39b6398397d13e555f3f
                                                        • Instruction ID: 25548228d3e8eb3df2ee5dcc0fc6b6c16b642f6f8209804e064240fe57eff9b2
                                                        • Opcode Fuzzy Hash: edfa937398291ec60fc4a5ed392b24bfb44c04815e4e39b6398397d13e555f3f
                                                        • Instruction Fuzzy Hash: D22159B1D003099FCB10CFAAC8847EEBBF5EF48224F54842ED519A7640DB78A945CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 165 7ef7ae8-7ef7b75 ReadProcessMemory 168 7ef7b7e-7ef7bae 165->168 169 7ef7b77-7ef7b7d 165->169 169->168
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07EF7B68
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: e18d55669d969e02f3d29a893647c7b1373335140511cc457f9998faed44b75f
                                                        • Instruction ID: ffc5c1dc9e791cbe74d15cf0128fe2fb3cf11b3afe3181edd235b39817ed9b19
                                                        • Opcode Fuzzy Hash: e18d55669d969e02f3d29a893647c7b1373335140511cc457f9998faed44b75f
                                                        • Instruction Fuzzy Hash: E72128B19003199FCF10CFA9C880AEEBBF5FF48324F54882AE519A7640D7789945CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 155 7ef7808-7ef7853 157 7ef7855-7ef7861 155->157 158 7ef7863-7ef7893 SetThreadContext 155->158 157->158 160 7ef789c-7ef78cc 158->160 161 7ef7895-7ef789b 158->161 161->160
                                                        APIs
                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 07EF7886
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: ContextThread
                                                        • String ID:
                                                        • API String ID: 1591575202-0
                                                        • Opcode ID: 6b3e831b5118fe1c80ebe05bc62830751847285bf2fab67c5efd3d62aed3acc8
                                                        • Instruction ID: aba98aabae1fbac3f77ef096bc8c27262f8e8e40617b19acf825c5cd175c6b90
                                                        • Opcode Fuzzy Hash: 6b3e831b5118fe1c80ebe05bc62830751847285bf2fab67c5efd3d62aed3acc8
                                                        • Instruction Fuzzy Hash: 4C2157B1D003099FCB10CFAAC8847EEBBF5AF48224F54842AD519A7640DB78A945CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 173 7ef7930-7ef79b3 VirtualAllocEx 177 7ef79bc-7ef79e1 173->177 178 7ef79b5-7ef79bb 173->178 178->177
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07EF79A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: bd4cdb28734989835e0f0f6dddca99a9ae2c918064d230d15c5cdb3c16ae8db7
                                                        • Instruction ID: aecd4c06355cca70af1e10a9bebcfe6d5aade841e3c5d362694684696d093c30
                                                        • Opcode Fuzzy Hash: bd4cdb28734989835e0f0f6dddca99a9ae2c918064d230d15c5cdb3c16ae8db7
                                                        • Instruction Fuzzy Hash: D51159B29002089FCF10DFA9C844BEFBBF5EF88324F14881AE615A7640C775A940CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 182 7ef7938-7ef79b3 VirtualAllocEx 185 7ef79bc-7ef79e1 182->185 186 7ef79b5-7ef79bb 182->186 186->185
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07EF79A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: b7bbe8ad26ce52d50895b6df5dd9e189a8181e09d3fed193377877574079c854
                                                        • Instruction ID: ca567f6a4f77b559bc13091e6bfc2968e468c830bfe0bb4d16a3bd2fa10d148b
                                                        • Opcode Fuzzy Hash: b7bbe8ad26ce52d50895b6df5dd9e189a8181e09d3fed193377877574079c854
                                                        • Instruction Fuzzy Hash: F81149B19002099FCF10DFA9C844BEFBBF9EF88324F14881AD559A7650C775A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 190 7ef7751-7ef77c7 ResumeThread 194 7ef77c9-7ef77cf 190->194 195 7ef77d0-7ef77f5 190->195 194->195
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 2fc1d8ce723f64ec9e21cfe2627be149d24a0829c34549a488082538d0eb2eca
                                                        • Instruction ID: b817226d3ffd3b54f84f08cbd61ee193442acb80e06e04066010e1b3a6aeaf20
                                                        • Opcode Fuzzy Hash: 2fc1d8ce723f64ec9e21cfe2627be149d24a0829c34549a488082538d0eb2eca
                                                        • Instruction Fuzzy Hash: 03112BB19007088FCB14DFA9C8457EFFBF9AB48224F14881ED559A7640C775A945CB94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 199 7ef7758-7ef77c7 ResumeThread 202 7ef77c9-7ef77cf 199->202 203 7ef77d0-7ef77f5 199->203 202->203
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 67d3d86fb4f337269527167475eecba2285c5ddc1f6b24fd2ad7fda3034c79ac
                                                        • Instruction ID: 1e2c4ca530d228f318161306846cc94f990b2b0cb131b63d45f6d9adb6dc61f1
                                                        • Opcode Fuzzy Hash: 67d3d86fb4f337269527167475eecba2285c5ddc1f6b24fd2ad7fda3034c79ac
                                                        • Instruction Fuzzy Hash: 00113DB19003088FCB14DFA9C8447DFFBF9AF48224F14881EC519A7640C775A944CB94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 212 7efa339-7efa3aa PostMessageW 214 7efa3ac-7efa3b2 212->214 215 7efa3b3-7efa3c7 212->215 214->215
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07EFA39D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: f1cd95e590e8d4db5c4ffd98cce5b21861bb86269da94ac9dbc25623660508d6
                                                        • Instruction ID: 4b8d12176f0794e6014c4c489553dd3d7153a0a0decf7004e106618fd5f856ec
                                                        • Opcode Fuzzy Hash: f1cd95e590e8d4db5c4ffd98cce5b21861bb86269da94ac9dbc25623660508d6
                                                        • Instruction Fuzzy Hash: 5B1118B58013099FCB10DF9AD885BDEFBF8EB49324F14841AD558A7600D374A544CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 207 7ef7194-7efa3aa PostMessageW 209 7efa3ac-7efa3b2 207->209 210 7efa3b3-7efa3c7 207->210 209->210
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07EFA39D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 95cbc7768d12eb63476380b2435791a0fa8685fdf648743ea13abf44f6433602
                                                        • Instruction ID: 2d9a38475e2c19ba8c7757aa9866b8191d1ef2f90d82a88b3b83f2d13417c8a6
                                                        • Opcode Fuzzy Hash: 95cbc7768d12eb63476380b2435791a0fa8685fdf648743ea13abf44f6433602
                                                        • Instruction Fuzzy Hash: B51118B59013499FCB20DF9AD844BDEFBF8EB49324F10841AE959A7600D374A944CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >
                                                        • API String ID: 0-325317158
                                                        • Opcode ID: cdeec109da6e4984beff96f807436dc64ad33613c2055bbfa7eba8dc71f88307
                                                        • Instruction ID: a1fd9f093a0924360c51a083e9979926d3bd1284f56a4d65b8cec793882050bf
                                                        • Opcode Fuzzy Hash: cdeec109da6e4984beff96f807436dc64ad33613c2055bbfa7eba8dc71f88307
                                                        • Instruction Fuzzy Hash: 4F51B1B1E056588FE719CF678C4028AFBF3AFC5210F08C5FAC50CAA265EB3049858F15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.358508505.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ef0000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >
                                                        • API String ID: 0-325317158
                                                        • Opcode ID: 35db9bd34077b50d6400ebb227af6d0982062cae729182f2a85351089d06ac0d
                                                        • Instruction ID: 7265746324a0913e34b44014778eb36428fc9be4db18cd906c697833151ee8ef
                                                        • Opcode Fuzzy Hash: 35db9bd34077b50d6400ebb227af6d0982062cae729182f2a85351089d06ac0d
                                                        • Instruction Fuzzy Hash: 545162B1E016598BEB1CCF6BCD4478EFAF7AFC9204F04C5BA850CAA255EB7045858F15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:11.1%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:90
                                                        Total number of Limit Nodes:6
                                                        execution_graph 34525 2c96d78 DuplicateHandle 34526 2c96e0e 34525->34526 34469 6032260 34470 603227e 34469->34470 34474 6033d80 34470->34474 34478 6033d76 34470->34478 34471 60322b5 34476 6033dd9 LoadLibraryA 34474->34476 34477 6033e5c 34476->34477 34480 6033d80 LoadLibraryA 34478->34480 34481 6033e5c 34480->34481 34527 2c9b651 34528 2c9b65a 34527->34528 34529 2c9b5f2 34527->34529 34532 2c9b83a 34529->34532 34530 2c9b60d 34533 2c9b843 34532->34533 34538 2c9ba1c 34532->34538 34542 2c9ba36 34532->34542 34546 2c9b920 34532->34546 34550 2c9b90f 34532->34550 34533->34530 34539 2c9b9cf 34538->34539 34539->34538 34540 2c9ba5b 34539->34540 34554 2c9bd17 34539->34554 34543 2c9ba49 34542->34543 34544 2c9ba5b 34542->34544 34545 2c9bd17 2 API calls 34543->34545 34545->34544 34547 2c9b964 34546->34547 34548 2c9ba5b 34547->34548 34549 2c9bd17 2 API calls 34547->34549 34549->34548 34551 2c9b920 34550->34551 34552 2c9ba5b 34551->34552 34553 2c9bd17 2 API calls 34551->34553 34553->34552 34555 2c9bd36 34554->34555 34559 2c9bd69 34555->34559 34563 2c9bd78 34555->34563 34556 2c9bd46 34556->34540 34560 2c9bdb2 34559->34560 34561 2c9bddc RtlEncodePointer 34560->34561 34562 2c9be05 34560->34562 34561->34562 34562->34556 34564 2c9bdb2 34563->34564 34565 2c9bddc RtlEncodePointer 34564->34565 34566 2c9be05 34564->34566 34565->34566 34566->34556 34482 f5d01c 34483 f5d034 34482->34483 34484 f5d08e 34483->34484 34489 2c95348 34483->34489 34493 2c93ca4 34483->34493 34501 2c97961 34483->34501 34509 2c95338 34483->34509 34490 2c9536e 34489->34490 34491 2c93ca4 CallWindowProcW 34490->34491 34492 2c9538f 34491->34492 34492->34484 34494 2c93caf 34493->34494 34495 2c979e9 34494->34495 34498 2c979d9 34494->34498 34496 2c979e7 34495->34496 34521 2c96964 34495->34521 34513 2c97b00 34498->34513 34517 2c97b10 34498->34517 34504 2c979b5 34501->34504 34502 2c979e9 34503 2c96964 CallWindowProcW 34502->34503 34506 2c979e7 34502->34506 34503->34506 34504->34502 34505 2c979d9 34504->34505 34507 2c97b00 CallWindowProcW 34505->34507 34508 2c97b10 CallWindowProcW 34505->34508 34507->34506 34508->34506 34510 2c9536e 34509->34510 34511 2c93ca4 CallWindowProcW 34510->34511 34512 2c9538f 34511->34512 34512->34484 34515 2c97b05 34513->34515 34514 2c96964 CallWindowProcW 34514->34515 34515->34514 34516 2c97c0f 34515->34516 34516->34496 34519 2c97b1e 34517->34519 34518 2c96964 CallWindowProcW 34518->34519 34519->34518 34520 2c97c0f 34519->34520 34520->34496 34522 2c9696f 34521->34522 34523 2c97cda CallWindowProcW 34522->34523 34524 2c97c89 34522->34524 34523->34524 34524->34496 34567 2c95190 34568 2c951f8 CreateWindowExW 34567->34568 34570 2c952b4 34568->34570 34571 2c96b50 GetCurrentProcess 34572 2c96bca GetCurrentThread 34571->34572 34573 2c96bc3 34571->34573 34574 2c96c00 34572->34574 34575 2c96c07 GetCurrentProcess 34572->34575 34573->34572 34574->34575 34577 2c96c3d 34575->34577 34576 2c96c65 GetCurrentThreadId 34578 2c96c96 34576->34578 34577->34576

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1196 6035594-603b12f 1198 603b131-603b15c 1196->1198 1199 603b19a-603b19e 1196->1199 1205 603b15e-603b160 1198->1205 1206 603b18c 1198->1206 1200 603b1a0-603b1c3 1199->1200 1201 603b1c9-603b1d4 1199->1201 1200->1201 1203 603b1e0-603b21b GetUserNameW 1201->1203 1204 603b1d6-603b1de 1201->1204 1207 603b224-603b23a 1203->1207 1208 603b21d-603b223 1203->1208 1204->1203 1210 603b182-603b18a 1205->1210 1211 603b162-603b16c 1205->1211 1214 603b191-603b194 1206->1214 1212 603b250-603b277 1207->1212 1213 603b23c-603b248 1207->1213 1208->1207 1210->1214 1215 603b170-603b17e 1211->1215 1216 603b16e 1211->1216 1222 603b287 1212->1222 1223 603b279-603b27d 1212->1223 1213->1212 1214->1199 1215->1215 1220 603b180 1215->1220 1216->1215 1220->1210 1225 603b288 1222->1225 1223->1222 1224 603b27f 1223->1224 1224->1222 1225->1225
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0603B20B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: daa08ed0f168d7c7f473c3d9337f95320cd66d7deb505d227440d2dae28d6918
                                                        • Instruction ID: 4b03924e54774e753fd1d580ef7e84bc32d1fc65f7657a852d9a36a9aa80296f
                                                        • Opcode Fuzzy Hash: daa08ed0f168d7c7f473c3d9337f95320cd66d7deb505d227440d2dae28d6918
                                                        • Instruction Fuzzy Hash: BA5135B1E00228CFDB94CFA9C888B9DBBF5BF48318F15812AD815AB350D7749844CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 02C96BB0
                                                        • GetCurrentThread.KERNEL32 ref: 02C96BED
                                                        • GetCurrentProcess.KERNEL32 ref: 02C96C2A
                                                        • GetCurrentThreadId.KERNEL32 ref: 02C96C83
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 08bb6577b4000e18d0376517acb3047eeb50eb3ec36c0dc67ac6f3183aef13d5
                                                        • Instruction ID: cfdba43052eb3b9956389bea9be49a37d1eab365d1176395bcf1b79ad0e57827
                                                        • Opcode Fuzzy Hash: 08bb6577b4000e18d0376517acb3047eeb50eb3ec36c0dc67ac6f3183aef13d5
                                                        • Instruction Fuzzy Hash: A95148B0A00648DFDB14CFA9D648BEEBBF4EF48314F20855AE009B7350D7356944CB65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1166 603b0c5-603b12f 1168 603b131-603b15c 1166->1168 1169 603b19a-603b19e 1166->1169 1175 603b15e-603b160 1168->1175 1176 603b18c 1168->1176 1170 603b1a0-603b1c3 1169->1170 1171 603b1c9-603b1d4 1169->1171 1170->1171 1173 603b1e0-603b21b GetUserNameW 1171->1173 1174 603b1d6-603b1de 1171->1174 1177 603b224-603b23a 1173->1177 1178 603b21d-603b223 1173->1178 1174->1173 1180 603b182-603b18a 1175->1180 1181 603b162-603b16c 1175->1181 1184 603b191-603b194 1176->1184 1182 603b250-603b277 1177->1182 1183 603b23c-603b248 1177->1183 1178->1177 1180->1184 1185 603b170-603b17e 1181->1185 1186 603b16e 1181->1186 1192 603b287 1182->1192 1193 603b279-603b27d 1182->1193 1183->1182 1184->1169 1185->1185 1190 603b180 1185->1190 1186->1185 1190->1180 1195 603b288 1192->1195 1193->1192 1194 603b27f 1193->1194 1194->1192 1195->1195
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0603B20B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: fc8e0908a4087729dfd872153e481fd948d01262a28d4a20635b8b04164c7b97
                                                        • Instruction ID: 8f319e2aec26d638e8ab9574a7c75ec90cab761beb9b06e682ee9b86ab0668a8
                                                        • Opcode Fuzzy Hash: fc8e0908a4087729dfd872153e481fd948d01262a28d4a20635b8b04164c7b97
                                                        • Instruction Fuzzy Hash: 12513371E00228CFDB94CFA9C888B9DBBF5BF48318F15812AD815AB351D7749845CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1226 6038e0c-603b12f 1228 603b131-603b15c 1226->1228 1229 603b19a-603b19e 1226->1229 1235 603b15e-603b160 1228->1235 1236 603b18c 1228->1236 1230 603b1a0-603b1c3 1229->1230 1231 603b1c9-603b1d4 1229->1231 1230->1231 1233 603b1e0-603b21b GetUserNameW 1231->1233 1234 603b1d6-603b1de 1231->1234 1237 603b224-603b23a 1233->1237 1238 603b21d-603b223 1233->1238 1234->1233 1240 603b182-603b18a 1235->1240 1241 603b162-603b16c 1235->1241 1244 603b191-603b194 1236->1244 1242 603b250-603b277 1237->1242 1243 603b23c-603b248 1237->1243 1238->1237 1240->1244 1245 603b170-603b17e 1241->1245 1246 603b16e 1241->1246 1252 603b287 1242->1252 1253 603b279-603b27d 1242->1253 1243->1242 1244->1229 1245->1245 1250 603b180 1245->1250 1246->1245 1250->1240 1255 603b288 1252->1255 1253->1252 1254 603b27f 1253->1254 1254->1252 1255->1255
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0603B20B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: 7f06398161e1fc94aa19dc7e58dafd8f4c8558d6c7e960a93e3a18b43ccbfc01
                                                        • Instruction ID: 70bfdc714acfcda8f5fcceeb7de8e9f920dc691af2b80f2c381936e869d34c41
                                                        • Opcode Fuzzy Hash: 7f06398161e1fc94aa19dc7e58dafd8f4c8558d6c7e960a93e3a18b43ccbfc01
                                                        • Instruction Fuzzy Hash: 545124B1E00228CFDB94CFA9C888B9DBBF5BF48319F15852AE815AB350D7749844CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1256 2c95184-2c951f6 1257 2c951f8-2c951fe 1256->1257 1258 2c95201-2c95208 1256->1258 1257->1258 1259 2c9520a-2c95210 1258->1259 1260 2c95213-2c9524b 1258->1260 1259->1260 1261 2c95253-2c952b2 CreateWindowExW 1260->1261 1262 2c952bb-2c952f3 1261->1262 1263 2c952b4-2c952ba 1261->1263 1267 2c95300 1262->1267 1268 2c952f5-2c952f8 1262->1268 1263->1262 1269 2c95301 1267->1269 1268->1267 1269->1269
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C952A2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: f35e2ececa1ba60e042c3bdc7d06340f2aad3f31d6b3e685f898f789b63ddded
                                                        • Instruction ID: 37c2b7f071718dd67fd57b6f446df5f765b11effac074b904233d27fa133fe93
                                                        • Opcode Fuzzy Hash: f35e2ececa1ba60e042c3bdc7d06340f2aad3f31d6b3e685f898f789b63ddded
                                                        • Instruction Fuzzy Hash: 6C51D2B1D103099FDF15CFA9C884ADEBBB5BF88314F64812AE819AB210D7719945CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1270 2c95190-2c951f6 1271 2c951f8-2c951fe 1270->1271 1272 2c95201-2c95208 1270->1272 1271->1272 1273 2c9520a-2c95210 1272->1273 1274 2c95213-2c952b2 CreateWindowExW 1272->1274 1273->1274 1276 2c952bb-2c952f3 1274->1276 1277 2c952b4-2c952ba 1274->1277 1281 2c95300 1276->1281 1282 2c952f5-2c952f8 1276->1282 1277->1276 1283 2c95301 1281->1283 1282->1281 1283->1283
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C952A2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 204529d4fd4ac153fb9569c37cde9739489216f4f4e7eeac4c62c702356783f0
                                                        • Instruction ID: 078ddec32552f46c1d1b3f54e2c56fec3ac8a28f304a271baacf878aba624aa8
                                                        • Opcode Fuzzy Hash: 204529d4fd4ac153fb9569c37cde9739489216f4f4e7eeac4c62c702356783f0
                                                        • Instruction Fuzzy Hash: 9441D1B1D10309DFDF15CFAAC884ADEBBB5BF88354F64812AE819AB210D7719945CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 02C97D01
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: ff8ca4c3a8f2b355edb128498bdaa387f1256caf8010967de3e72aab7fa35f86
                                                        • Instruction ID: 5aabaad2b97326a4f213612266e8ce1f2d1043e6beede5e54955204cd192fca8
                                                        • Opcode Fuzzy Hash: ff8ca4c3a8f2b355edb128498bdaa387f1256caf8010967de3e72aab7fa35f86
                                                        • Instruction Fuzzy Hash: 0E4147B5A00605CFCB14CF99C488BAAFBF5FF88314F248899D419AB321D330A845CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DeleteFileW.KERNELBASE(00000000), ref: 0603B5F0
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 018859cdcac412474999e930f3e6f337793bc19d6f273364a535037f2f1c76a9
                                                        • Instruction ID: b35d7139b91a285183e109da48b0dab0be5a19a6c9bddb0acdad8f2a337a64b4
                                                        • Opcode Fuzzy Hash: 018859cdcac412474999e930f3e6f337793bc19d6f273364a535037f2f1c76a9
                                                        • Instruction Fuzzy Hash: 1031FFB1E0425A9FCB00CFAAC444BEEBBF8EF48314F15816AD458A7241D738A805CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryA.KERNELBASE(?), ref: 06033E4A
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 67e0591f3087fadd6778d64dbed87f6d2c056a25358401a2c2f28f66837f92db
                                                        • Instruction ID: d06e1d0fd67d35042955c0db6d338b180832aa7ba8254502fb281528e0e68b29
                                                        • Opcode Fuzzy Hash: 67e0591f3087fadd6778d64dbed87f6d2c056a25358401a2c2f28f66837f92db
                                                        • Instruction Fuzzy Hash: 553156B1D403998FCB58CFA9C88579EBFF5BF08315F10852AE815AB280E7749881CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryA.KERNELBASE(?), ref: 06033E4A
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 9d89b4afe66cbe698b694f6292f831945a0c0d068803a56dd7f7a5d8e1b1e47c
                                                        • Instruction ID: d5119d8ec2978add8ebcf937a3016900f8db5eb4c8ee6c13f4499c820aa53f27
                                                        • Opcode Fuzzy Hash: 9d89b4afe66cbe698b694f6292f831945a0c0d068803a56dd7f7a5d8e1b1e47c
                                                        • Instruction Fuzzy Hash: 4F3145B1D403998FDB58CFA9C88579EBFF5BF08315F10852AE815A7280E7749881CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02C96DFF
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: c9edf1d48b96a9515f6c4ae130cb7f5a48b0e1e1471adc7c3428ae69318b6afb
                                                        • Instruction ID: 67f614d030369a4711f66adb0b6874379938606681d6529d0f2fe66afbcb0c5f
                                                        • Opcode Fuzzy Hash: c9edf1d48b96a9515f6c4ae130cb7f5a48b0e1e1471adc7c3428ae69318b6afb
                                                        • Instruction Fuzzy Hash: 8421E3B5900249DFDB10CFA9D484AEEBBF8EB48324F14842AE954A7250D379A955CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02C96DFF
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: fd75f9ef7ec772bea4d05e6d99e0593cd173a78470da941f2f9ca0bb5f637d5e
                                                        • Instruction ID: 23167e1f5246874ce0a1797106ddb9cafa933f8e6d119f16bd3820a06ea918b0
                                                        • Opcode Fuzzy Hash: fd75f9ef7ec772bea4d05e6d99e0593cd173a78470da941f2f9ca0bb5f637d5e
                                                        • Instruction Fuzzy Hash: 1321E2B5900248AFDB10CFAAD884ADEBBF8FB48324F14841AE914A7350D375A944CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DeleteFileW.KERNELBASE(00000000), ref: 0603B5F0
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.575790534.0000000006030000.00000040.00000800.00020000.00000000.sdmp, Offset: 06030000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6030000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 1f5998f08d3d74f060132697459589675babb14b8ed3df7d3f463f9026413783
                                                        • Instruction ID: 44e3551db69f0fac5a07e986cf13c011d90e932be3e7632443e11a57b6d35d1c
                                                        • Opcode Fuzzy Hash: 1f5998f08d3d74f060132697459589675babb14b8ed3df7d3f463f9026413783
                                                        • Instruction Fuzzy Hash: 372138B1D006199BCB10CF9AC4447EEFBF4AB48324F04852AD819B7640D734A944CFE5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RtlEncodePointer.NTDLL(00000000), ref: 02C9BDF2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID:
                                                        • API String ID: 2118026453-0
                                                        • Opcode ID: 57e81b3569905c204e7863484d67562a7435ef6217d42a765a807b295e457a12
                                                        • Instruction ID: 29dd21f59d59db579c6bd18bae1ac54667d5165858c1398908a9fbc0017556b6
                                                        • Opcode Fuzzy Hash: 57e81b3569905c204e7863484d67562a7435ef6217d42a765a807b295e457a12
                                                        • Instruction Fuzzy Hash: 912149B29143858FCF20DFA9D54979EBBF4FB48318F14852AD445A7600C3396609CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RtlEncodePointer.NTDLL(00000000), ref: 02C9BDF2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.571980986.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_2c90000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID:
                                                        • API String ID: 2118026453-0
                                                        • Opcode ID: a4ec65eb092e85942ff902ae9011394a7e17efc1fd2999d29f316ec94c6599a0
                                                        • Instruction ID: 01e3ce265179de55c621560f085c3ee57aa67eebd6d0575c562c279e16dde4df
                                                        • Opcode Fuzzy Hash: a4ec65eb092e85942ff902ae9011394a7e17efc1fd2999d29f316ec94c6599a0
                                                        • Instruction Fuzzy Hash: DA116AB2900345CFCF20DFAAD54879EBBF8FB48318F10852AD409A7600D7396A04CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.570454213.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f3d000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2310c5e6c034a7d0d25982e1e427e96238ee112138897a9eeba3ad5fc1701d0
                                                        • Instruction ID: c7dc4d83c83124cebdc544c1c08c1f962518558ba15316586ce589c473b4c8f8
                                                        • Opcode Fuzzy Hash: b2310c5e6c034a7d0d25982e1e427e96238ee112138897a9eeba3ad5fc1701d0
                                                        • Instruction Fuzzy Hash: CF2125B2504244DFCF01DF10E9C0F66BF69FB94338F288669E8054B246C336D856EBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.570532659.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f5d000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6cc0ba03af01bd4f5c5b10a4a4fe37ebd45770ce24f3d8b2f4cff2b070ab5d12
                                                        • Instruction ID: b0442d5a502e547255df331443e3970d9b62dc8d6462fe7209de2a0793b0100f
                                                        • Opcode Fuzzy Hash: 6cc0ba03af01bd4f5c5b10a4a4fe37ebd45770ce24f3d8b2f4cff2b070ab5d12
                                                        • Instruction Fuzzy Hash: 9F212571604200DFCB24CF20D5C4B66BB65FB84325F24C96DDE0A4B28AC33AD80BDAA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.570532659.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f5d000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f0b0845dc96ccaeaaf279ea0be787dec799b7b2810fad219c25b1f89bb6dd9c
                                                        • Instruction ID: 2abc3aaab80250c46a1abe166bca880b98dd50a11513531c97661db9a2e501ef
                                                        • Opcode Fuzzy Hash: 1f0b0845dc96ccaeaaf279ea0be787dec799b7b2810fad219c25b1f89bb6dd9c
                                                        • Instruction Fuzzy Hash: 402195755093C08FCB12CF20D590715BF71EB46324F28C5EAD8458F697C33A980ACB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.570454213.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_f3d000_Updated statement.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e9e89bd678da6e79e78f2899492aff1fcf98354fa6c1d5f59d60be16a1a1a797
                                                        • Instruction ID: d790e3ca106eea8539db5ab292a257698a09012935963f8f60c5d2fd7ba13f85
                                                        • Opcode Fuzzy Hash: e9e89bd678da6e79e78f2899492aff1fcf98354fa6c1d5f59d60be16a1a1a797
                                                        • Instruction Fuzzy Hash: E011D376904280CFCB12CF10E9C4B56BF72FB94334F28C6A9D8094B656C336D85ADBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:7.4%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:155
                                                        Total number of Limit Nodes:5
                                                        execution_graph 17159 690a0c0 17160 690a24b 17159->17160 17162 690a0e6 17159->17162 17162->17160 17163 6907194 17162->17163 17164 690a340 PostMessageW 17163->17164 17165 690a3ac 17164->17165 17165->17162 16962 69084b2 16964 6908101 16962->16964 16963 690852b 16964->16963 16967 6908c38 16964->16967 16972 6908c29 16964->16972 16968 6908c52 16967->16968 16977 6908c98 16968->16977 16982 6908c88 16968->16982 16969 6908c80 16969->16964 16973 6908c52 16972->16973 16975 6908c98 12 API calls 16973->16975 16976 6908c88 12 API calls 16973->16976 16974 6908c80 16974->16964 16975->16974 16976->16974 16978 6908cb5 16977->16978 16987 69090f8 16978->16987 17001 69090e9 16978->17001 16983 6908cb5 16982->16983 16985 69090f8 12 API calls 16983->16985 16986 69090e9 12 API calls 16983->16986 16984 6908cf5 16984->16969 16985->16984 16986->16984 16988 6909112 16987->16988 17015 6909a24 16988->17015 17033 6909cb4 16988->17033 17041 6909740 16988->17041 17046 69094de 16988->17046 17051 69091ee 16988->17051 17056 690962b 16988->17056 17060 6909c0b 16988->17060 17068 690967b 16988->17068 17076 6909359 16988->17076 17081 69092d8 16988->17081 17086 69098e7 16988->17086 17002 6909112 17001->17002 17004 6909740 2 API calls 17002->17004 17005 6909cb4 4 API calls 17002->17005 17006 6909a24 6 API calls 17002->17006 17007 69098e7 2 API calls 17002->17007 17008 69092d8 2 API calls 17002->17008 17009 6909359 2 API calls 17002->17009 17010 690967b 4 API calls 17002->17010 17011 6909c0b 4 API calls 17002->17011 17012 690962b 2 API calls 17002->17012 17013 69091ee 2 API calls 17002->17013 17014 69094de 2 API calls 17002->17014 17003 6908cf5 17003->16969 17004->17003 17005->17003 17006->17003 17007->17003 17008->17003 17009->17003 17010->17003 17011->17003 17012->17003 17013->17003 17014->17003 17016 6909766 17015->17016 17017 6909a31 17015->17017 17106 6907751 17016->17106 17110 6907758 17016->17110 17018 69096a1 17017->17018 17019 6909a6c 17017->17019 17022 6909307 17017->17022 17098 6907930 17018->17098 17102 6907938 17018->17102 17020 6909b20 17019->17020 17019->17022 17025 69079f0 WriteProcessMemory 17019->17025 17026 69079f8 WriteProcessMemory 17019->17026 17020->17022 17023 69079f0 WriteProcessMemory 17020->17023 17024 69079f8 WriteProcessMemory 17020->17024 17021 690937f 17021->17022 17090 69079f0 17021->17090 17094 69079f8 17021->17094 17023->17022 17024->17022 17025->17020 17026->17020 17034 69096a1 17033->17034 17036 69093a0 17033->17036 17037 6907930 VirtualAllocEx 17034->17037 17038 6907938 VirtualAllocEx 17034->17038 17035 690937f 17035->17036 17039 69079f0 WriteProcessMemory 17035->17039 17040 69079f8 WriteProcessMemory 17035->17040 17037->17035 17038->17035 17039->17036 17040->17036 17042 690974a 17041->17042 17044 6907751 ResumeThread 17042->17044 17045 6907758 ResumeThread 17042->17045 17043 690977b 17044->17043 17045->17043 17047 69094f0 17046->17047 17048 690977b 17047->17048 17049 6907751 ResumeThread 17047->17049 17050 6907758 ResumeThread 17047->17050 17049->17048 17050->17048 17052 69091fb 17051->17052 17114 6907c80 17052->17114 17118 6907c74 17052->17118 17122 6907ae0 17056->17122 17126 6907ae8 17056->17126 17057 6909652 17061 6909c14 17060->17061 17063 69094bc 17061->17063 17130 6907800 17061->17130 17134 6907808 17061->17134 17062 6909550 17062->17063 17064 6907751 ResumeThread 17062->17064 17065 6907758 ResumeThread 17062->17065 17064->17063 17065->17063 17069 6909685 17068->17069 17074 6907930 VirtualAllocEx 17069->17074 17075 6907938 VirtualAllocEx 17069->17075 17070 690937f 17071 69093a0 17070->17071 17072 69079f0 WriteProcessMemory 17070->17072 17073 69079f8 WriteProcessMemory 17070->17073 17072->17071 17073->17071 17074->17070 17075->17070 17077 6909363 17076->17077 17079 69079f0 WriteProcessMemory 17077->17079 17080 69079f8 WriteProcessMemory 17077->17080 17078 69093a0 17078->17078 17079->17078 17080->17078 17082 69092e9 17081->17082 17083 6909307 17082->17083 17084 69079f0 WriteProcessMemory 17082->17084 17085 69079f8 WriteProcessMemory 17082->17085 17083->17083 17084->17083 17085->17083 17088 6907800 GetThreadContext 17086->17088 17089 6907808 GetThreadContext 17086->17089 17087 6909901 17088->17087 17089->17087 17091 6907a40 WriteProcessMemory 17090->17091 17093 6907a97 17091->17093 17093->17022 17095 6907a40 WriteProcessMemory 17094->17095 17097 6907a97 17095->17097 17097->17022 17099 6907978 VirtualAllocEx 17098->17099 17101 69079b5 17099->17101 17101->17021 17103 6907978 VirtualAllocEx 17102->17103 17105 69079b5 17103->17105 17105->17021 17107 6907798 ResumeThread 17106->17107 17109 69077c9 17107->17109 17109->17022 17111 6907798 ResumeThread 17110->17111 17113 69077c9 17111->17113 17113->17022 17115 6907d09 CreateProcessA 17114->17115 17117 6907ecb 17115->17117 17119 6907d09 CreateProcessA 17118->17119 17121 6907ecb 17119->17121 17123 6907b33 ReadProcessMemory 17122->17123 17125 6907b77 17123->17125 17125->17057 17127 6907b33 ReadProcessMemory 17126->17127 17129 6907b77 17127->17129 17129->17057 17131 690784d GetThreadContext 17130->17131 17133 6907895 17131->17133 17133->17062 17135 690784d GetThreadContext 17134->17135 17137 6907895 17135->17137 17137->17062 17166 690ad28 FindCloseChangeNotification 17167 690ad8f 17166->17167 17138 be3e50 17139 be3e64 17138->17139 17140 be3ee7 17139->17140 17142 be3fd1 17139->17142 17143 be3ff5 17142->17143 17147 be44d0 17143->17147 17151 be44c1 17143->17151 17149 be44f7 17147->17149 17148 be45d4 17148->17148 17149->17148 17155 be3e24 17149->17155 17153 be44f7 17151->17153 17152 be45d4 17152->17152 17153->17152 17154 be3e24 CreateActCtxA 17153->17154 17154->17152 17156 be5560 CreateActCtxA 17155->17156 17158 be5623 17156->17158

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 669 6907c74-6907d15 671 6907d17-6907d21 669->671 672 6907d4e-6907d6e 669->672 671->672 673 6907d23-6907d25 671->673 679 6907d70-6907d7a 672->679 680 6907da7-6907dd6 672->680 674 6907d27-6907d31 673->674 675 6907d48-6907d4b 673->675 677 6907d33 674->677 678 6907d35-6907d44 674->678 675->672 677->678 678->678 681 6907d46 678->681 679->680 682 6907d7c-6907d7e 679->682 686 6907dd8-6907de2 680->686 687 6907e0f-6907ec9 CreateProcessA 680->687 681->675 684 6907d80-6907d8a 682->684 685 6907da1-6907da4 682->685 688 6907d8c 684->688 689 6907d8e-6907d9d 684->689 685->680 686->687 691 6907de4-6907de6 686->691 700 6907ed2-6907f58 687->700 701 6907ecb-6907ed1 687->701 688->689 689->689 690 6907d9f 689->690 690->685 692 6907de8-6907df2 691->692 693 6907e09-6907e0c 691->693 695 6907df4 692->695 696 6907df6-6907e05 692->696 693->687 695->696 696->696 698 6907e07 696->698 698->693 711 6907f68-6907f6c 700->711 712 6907f5a-6907f5e 700->712 701->700 714 6907f7c-6907f80 711->714 715 6907f6e-6907f72 711->715 712->711 713 6907f60 712->713 713->711 716 6907f90-6907f94 714->716 717 6907f82-6907f86 714->717 715->714 718 6907f74 715->718 720 6907fa6-6907fad 716->720 721 6907f96-6907f9c 716->721 717->716 719 6907f88 717->719 718->714 719->716 722 6907fc4 720->722 723 6907faf-6907fbe 720->723 721->720 725 6907fc5 722->725 723->722 725->725
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06907EB6
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: c07db33a7c58dba06a3e8de6cebd858ca611d2e26d21bd8325e1b7575682ecb5
                                                        • Instruction ID: 9ab3afc2eb06c6b2365a2b64318cefae1bf9ee9d7abd7b63d837ef95b3d9764c
                                                        • Opcode Fuzzy Hash: c07db33a7c58dba06a3e8de6cebd858ca611d2e26d21bd8325e1b7575682ecb5
                                                        • Instruction Fuzzy Hash: AAA16D71D00219DFEB60CFA4C840BEDBBB6FF48314F148569D909AB680DB74A985CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 726 6907c80-6907d15 728 6907d17-6907d21 726->728 729 6907d4e-6907d6e 726->729 728->729 730 6907d23-6907d25 728->730 736 6907d70-6907d7a 729->736 737 6907da7-6907dd6 729->737 731 6907d27-6907d31 730->731 732 6907d48-6907d4b 730->732 734 6907d33 731->734 735 6907d35-6907d44 731->735 732->729 734->735 735->735 738 6907d46 735->738 736->737 739 6907d7c-6907d7e 736->739 743 6907dd8-6907de2 737->743 744 6907e0f-6907ec9 CreateProcessA 737->744 738->732 741 6907d80-6907d8a 739->741 742 6907da1-6907da4 739->742 745 6907d8c 741->745 746 6907d8e-6907d9d 741->746 742->737 743->744 748 6907de4-6907de6 743->748 757 6907ed2-6907f58 744->757 758 6907ecb-6907ed1 744->758 745->746 746->746 747 6907d9f 746->747 747->742 749 6907de8-6907df2 748->749 750 6907e09-6907e0c 748->750 752 6907df4 749->752 753 6907df6-6907e05 749->753 750->744 752->753 753->753 755 6907e07 753->755 755->750 768 6907f68-6907f6c 757->768 769 6907f5a-6907f5e 757->769 758->757 771 6907f7c-6907f80 768->771 772 6907f6e-6907f72 768->772 769->768 770 6907f60 769->770 770->768 773 6907f90-6907f94 771->773 774 6907f82-6907f86 771->774 772->771 775 6907f74 772->775 777 6907fa6-6907fad 773->777 778 6907f96-6907f9c 773->778 774->773 776 6907f88 774->776 775->771 776->773 779 6907fc4 777->779 780 6907faf-6907fbe 777->780 778->777 782 6907fc5 779->782 780->779 782->782
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06907EB6
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 66f31cfcfd49ef5e7c569b6910735c04f16b91624eebc39548b7da774b9a1ac5
                                                        • Instruction ID: 16fb510687a4683bb9ba207648e3954a9eecdd265f6282d2027d1e9fdaae6e03
                                                        • Opcode Fuzzy Hash: 66f31cfcfd49ef5e7c569b6910735c04f16b91624eebc39548b7da774b9a1ac5
                                                        • Instruction Fuzzy Hash: 5B916E71D00219DFEB60CFA4C840BEEBBB6BF48314F148569D809AB680DB74A985CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 800 be5554-be5621 CreateActCtxA 802 be562a-be5684 800->802 803 be5623-be5629 800->803 810 be5686-be5689 802->810 811 be5693-be5697 802->811 803->802 810->811 812 be56a8 811->812 813 be5699-be56a5 811->813 815 be56a9 812->815 813->812 815->815
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 00BE5611
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.471387004.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_be0000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: ae2fa7c1476eab76edbd50323fb0c15c58693d473e20af9cf24b7383110d3e6b
                                                        • Instruction ID: 729cbba3761bff91e557ba4e73cd0bab07e9b0bc5449a5a1ace7ee3a6d52244b
                                                        • Opcode Fuzzy Hash: ae2fa7c1476eab76edbd50323fb0c15c58693d473e20af9cf24b7383110d3e6b
                                                        • Instruction Fuzzy Hash: 05411271C00658CFDB20CFA9C884BCEBBF5BF89308F60846AD409AB255DB756946CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 783 be3e24-be5621 CreateActCtxA 786 be562a-be5684 783->786 787 be5623-be5629 783->787 794 be5686-be5689 786->794 795 be5693-be5697 786->795 787->786 794->795 796 be56a8 795->796 797 be5699-be56a5 795->797 799 be56a9 796->799 797->796 799->799
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 00BE5611
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.471387004.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_be0000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 54e96da7ae8bca82366e06007f04f1c483b0e2338174486d718a6da9b723a9ac
                                                        • Instruction ID: 64bfc2185a45ce80d2d0c38dcd736136d932500124d317ca116f02104069c43a
                                                        • Opcode Fuzzy Hash: 54e96da7ae8bca82366e06007f04f1c483b0e2338174486d718a6da9b723a9ac
                                                        • Instruction Fuzzy Hash: 8641F071D00A58CFDB20CFA9C884BDEBBF9BF49308F60846AD509AB255D7B16945CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 816 69079f0-6907a46 818 6907a56-6907a95 WriteProcessMemory 816->818 819 6907a48-6907a54 816->819 821 6907a97-6907a9d 818->821 822 6907a9e-6907ace 818->822 819->818 821->822
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06907A88
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 05cbc25a64e124c7f44482117ac08def11cca190fa4e1298560e6957d32cc03e
                                                        • Instruction ID: 323290ab006f865469a1d8b4ddb186b71e6772202b316b5daeb59f474556946b
                                                        • Opcode Fuzzy Hash: 05cbc25a64e124c7f44482117ac08def11cca190fa4e1298560e6957d32cc03e
                                                        • Instruction Fuzzy Hash: D5215C729003499FDF50CFA9C884BEEBBF5FF48324F14842AE919A7640D778A945CB94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 826 69079f8-6907a46 828 6907a56-6907a95 WriteProcessMemory 826->828 829 6907a48-6907a54 826->829 831 6907a97-6907a9d 828->831 832 6907a9e-6907ace 828->832 829->828 831->832
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06907A88
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 66a9d406d0157bcd5a7dae398d93e8d1df85e4f5c8491ea799657cd594970950
                                                        • Instruction ID: 5fd5372bd033941efda8e80f90b57c07e7718eb5ecca5d87eeb5be6662f43f9e
                                                        • Opcode Fuzzy Hash: 66a9d406d0157bcd5a7dae398d93e8d1df85e4f5c8491ea799657cd594970950
                                                        • Instruction Fuzzy Hash: 66212A719003499FCF10CFA9C884BEEBBF5FF48324F54842AE919A7640D778A944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 836 6907ae0-6907b75 ReadProcessMemory 839 6907b77-6907b7d 836->839 840 6907b7e-6907bae 836->840 839->840
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06907B68
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: de8232eb32eadabf1ec42bdf8a3ac3020692b3fbbb76fade609684696d07b0fa
                                                        • Instruction ID: e0e1b1c78b647ac0e8ebc4cad00ef42dbe7df93f9e5a01a1d179e72ab9709b27
                                                        • Opcode Fuzzy Hash: de8232eb32eadabf1ec42bdf8a3ac3020692b3fbbb76fade609684696d07b0fa
                                                        • Instruction Fuzzy Hash: 9B2139B1C002099FCF10CFA9C880AEEBBF5FF48320F54842AE919A7640D7389945DBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 854 6907ae8-6907b75 ReadProcessMemory 857 6907b77-6907b7d 854->857 858 6907b7e-6907bae 854->858 857->858
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06907B68
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 044bc70c7841eb8bb910ad48fabf4c49570f17fdd600cf2e7710c3512d321dc6
                                                        • Instruction ID: 155824902168a04bd229e9c5f9ac7876e7b13e673b70865ae2a1c8654946b18c
                                                        • Opcode Fuzzy Hash: 044bc70c7841eb8bb910ad48fabf4c49570f17fdd600cf2e7710c3512d321dc6
                                                        • Instruction Fuzzy Hash: FD212A719003499FCF10CFA9C840AEEBBF5FF48324F54842AE519A7650D739A944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 844 6907808-6907853 846 6907863-6907893 GetThreadContext 844->846 847 6907855-6907861 844->847 849 6907895-690789b 846->849 850 690789c-69078cc 846->850 847->846 849->850
                                                        APIs
                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 06907886
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ContextThread
                                                        • String ID:
                                                        • API String ID: 1591575202-0
                                                        • Opcode ID: 0d6d22c587bb2f59da30fc7cd3d572e861b7195181b638d841016576b339273e
                                                        • Instruction ID: 1af093fa5ce5499b4feb18b076d158348cc36ef65470d54a051ad8162178737e
                                                        • Opcode Fuzzy Hash: 0d6d22c587bb2f59da30fc7cd3d572e861b7195181b638d841016576b339273e
                                                        • Instruction Fuzzy Hash: DF213A71D003089FDB50DFA9C4847EEBBF4EF48324F54842AD519A7640DB78A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 862 6907800-6907853 864 6907863-6907893 GetThreadContext 862->864 865 6907855-6907861 862->865 867 6907895-690789b 864->867 868 690789c-69078cc 864->868 865->864 867->868
                                                        APIs
                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 06907886
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ContextThread
                                                        • String ID:
                                                        • API String ID: 1591575202-0
                                                        • Opcode ID: a2d4be44b28c625310826b363c65ebd379f1ce9ea09db2a5f45e62b8bcca8344
                                                        • Instruction ID: 07089613621350dc8962b21e5691b9391f058092bbcfedd516508509c8a381e1
                                                        • Opcode Fuzzy Hash: a2d4be44b28c625310826b363c65ebd379f1ce9ea09db2a5f45e62b8bcca8344
                                                        • Instruction Fuzzy Hash: 7C216871D003098FDB54CFA9C4807EEBBF5AF48324F54842AD559A7640CB78A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 872 6907930-69079b3 VirtualAllocEx 875 69079b5-69079bb 872->875 876 69079bc-69079e1 872->876 875->876
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069079A6
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: cb74acdabf9638b9076dd4b61eb17b4193e92074db7e50f96ef6a597b0075960
                                                        • Instruction ID: 45fec1a9b229564f30ef0b3656a051fa04ac25cfbb39dbae75deb0e2d547521b
                                                        • Opcode Fuzzy Hash: cb74acdabf9638b9076dd4b61eb17b4193e92074db7e50f96ef6a597b0075960
                                                        • Instruction Fuzzy Hash: 87115C729002089FDB10DFE9C844BDFBBF5EF88324F14882AD515A7650D7359945CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 880 6907938-69079b3 VirtualAllocEx 883 69079b5-69079bb 880->883 884 69079bc-69079e1 880->884 883->884
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069079A6
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 7f5c033a780c9d58a49765231f2ba1449500f65221defd701513047b7c59b641
                                                        • Instruction ID: 3ecdb6b3db707a646bc0a322996f746a38c6f9eb40d4843177027af655898658
                                                        • Opcode Fuzzy Hash: 7f5c033a780c9d58a49765231f2ba1449500f65221defd701513047b7c59b641
                                                        • Instruction Fuzzy Hash: D21137729002489FCF10DFE9C844BEFBBF9AF88324F14881AE519A7650C775A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 0690AD80
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 40334f0bf93295cad9efb7d469ac24a51b33c848e283b19dda2213da84b03513
                                                        • Instruction ID: 4ed4ce60a6125b57427e6587b75680503627b2ccf3d7bbe20ec9b706e87dbb0c
                                                        • Opcode Fuzzy Hash: 40334f0bf93295cad9efb7d469ac24a51b33c848e283b19dda2213da84b03513
                                                        • Instruction Fuzzy Hash: 19113AB68003098FCB10DFA9D444BDEBBF4EF48324F24842AD959A7641D739A545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 32f1def2d4ce67b45df6299af5eaf1995627fde610d41dd51999d105a7e35156
                                                        • Instruction ID: 7161041924670cb4f94dc7db2c15e16667f06806a1d3cb28632c57b3d29ef268
                                                        • Opcode Fuzzy Hash: 32f1def2d4ce67b45df6299af5eaf1995627fde610d41dd51999d105a7e35156
                                                        • Instruction Fuzzy Hash: 171158B19003088FDB14CFA9C4447EEFBF9AF48324F14882AC11AB7A40CB38A945CB94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: a2cba9d6609bc02be7e7992e6d850042d977e3fb0c49c7ad252a8e7e42919d60
                                                        • Instruction ID: 23e222a210fb8fa99f6ed86c30a2f1da9018a509897a2e544f95b9a07a777fe8
                                                        • Opcode Fuzzy Hash: a2cba9d6609bc02be7e7992e6d850042d977e3fb0c49c7ad252a8e7e42919d60
                                                        • Instruction Fuzzy Hash: 581128B19003488FDB14DFA9C8447EEFBF9AB88224F14882AD519A7640C779A944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 0690A39D
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: f7965c40aca52ac16956329bd030062603e465e7b98563772ef1b1aadfb5e5df
                                                        • Instruction ID: a0941c3b9fc31c2eb22e56576d49bf6625ced150dc731bb7798b74d736f1243a
                                                        • Opcode Fuzzy Hash: f7965c40aca52ac16956329bd030062603e465e7b98563772ef1b1aadfb5e5df
                                                        • Instruction Fuzzy Hash: 481118B58003489FDB10CF99D884BDEFBF8FB48320F14841AE559A7640D375A945CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 0690AD80
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: b2ca578b002b20e3d94efdf0713dd59f2ca53f35dacd331aec52722ef610e4ff
                                                        • Instruction ID: 5fbc75259315ff79626742f3ef6214671bcf05f3ec6d3ec264ec3a722c03dc94
                                                        • Opcode Fuzzy Hash: b2ca578b002b20e3d94efdf0713dd59f2ca53f35dacd331aec52722ef610e4ff
                                                        • Instruction Fuzzy Hash: AE1148B28003098FCB10DF99C444BDEBBF4EF48324F14842AD959A7740D738A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 0690A39D
                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.478730017.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_6900000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 2dcb885a6803b95626b271a3b9b719ee4d94dd6e421fe3c3465264c6e4b6a4ef
                                                        • Instruction ID: f2249f7454011b99261ef23d709d2d7b3d9cb41f7660509dd757ef79158d6afe
                                                        • Opcode Fuzzy Hash: 2dcb885a6803b95626b271a3b9b719ee4d94dd6e421fe3c3465264c6e4b6a4ef
                                                        • Instruction Fuzzy Hash: 161136B58003489FDB10CF9AC844BDEBBF8EB48320F10841AE515A7650D374A944CFE0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469354367.000000000075D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_75d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 576a63a28cabcb592c4e09a6fecac4f79a43f472afff7d423b9125601be16920
                                                        • Instruction ID: d4046963c20f81a058800066e43468a4dd2bb1573a0053c20f2d2d1462409b31
                                                        • Opcode Fuzzy Hash: 576a63a28cabcb592c4e09a6fecac4f79a43f472afff7d423b9125601be16920
                                                        • Instruction Fuzzy Hash: D9213671504200DFCB31CF10D9C4FA6BB65FB98319F24856DEC050A246D37ADC6AC6A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469428943.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_76d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c9c9c8476fdac12de5baded1f5771db4d5d78f23d824d463fa7af9382add8c78
                                                        • Instruction ID: 7ec8d4a4b7a088e7971c72d00a9bb54008287e583dc32ba93f774f9e8cca1968
                                                        • Opcode Fuzzy Hash: c9c9c8476fdac12de5baded1f5771db4d5d78f23d824d463fa7af9382add8c78
                                                        • Instruction Fuzzy Hash: E221D375A04244DFCB24CF64D5C4B66BB65FB88314F24C96DDC0A4B246C33BDC46CAA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469354367.000000000075D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_75d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e9e89bd678da6e79e78f2899492aff1fcf98354fa6c1d5f59d60be16a1a1a797
                                                        • Instruction ID: 75e5c070528b5f3c9db981d21dfbefa9aadce9d4c123c2f9e068ba4c1156a284
                                                        • Opcode Fuzzy Hash: e9e89bd678da6e79e78f2899492aff1fcf98354fa6c1d5f59d60be16a1a1a797
                                                        • Instruction Fuzzy Hash: A711D376504280DFCB22CF10D5C4B56BF72FB94325F24C6A9DC054B656C37AD86ACBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469428943.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_76d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f446c124fde14c8a3a2afcdd013794855d3a428459493c6c5cafdca144aff94d
                                                        • Instruction ID: d49c2903fa6fd8fbeb6e6540798a3c3e7e99f48f54daf88b9673a774caf43594
                                                        • Opcode Fuzzy Hash: f446c124fde14c8a3a2afcdd013794855d3a428459493c6c5cafdca144aff94d
                                                        • Instruction Fuzzy Hash: 98118E75A04280DFCB21CF14D5D4B15BB61FB88314F28C6A9DC4A4B656C33BD84ACB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469354367.000000000075D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_75d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6a59874722a1c97a0bc78e8a80c3acb25aa3b5500ca06ce988bcca0130609b3d
                                                        • Instruction ID: 77639ed8553ea620e7700772d53e7f276419420da4902cabeb8b45189ed6826d
                                                        • Opcode Fuzzy Hash: 6a59874722a1c97a0bc78e8a80c3acb25aa3b5500ca06ce988bcca0130609b3d
                                                        • Instruction Fuzzy Hash: 9801D471404344AAD7304A65DCC4BE6BBDCEF41325F18C51EED085A242C3B9AC48C6B1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000010.00000002.469354367.000000000075D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0075D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_16_2_75d000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eb5d2e6759a5fba043d7f4f1a83011e3d80ebd785aaf1ed841ecfb682aa24bfb
                                                        • Instruction ID: 224481f8ed893565e0da79105860358c50ec4ecbb37b8de014c8f298cc7cda55
                                                        • Opcode Fuzzy Hash: eb5d2e6759a5fba043d7f4f1a83011e3d80ebd785aaf1ed841ecfb682aa24bfb
                                                        • Instruction Fuzzy Hash: FBF06871404384AEE7208A15DCC4BA2FBD8EB51775F18C55AED185F646C3B9AC48CAB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:6.3%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:128
                                                        Total number of Limit Nodes:6
                                                        execution_graph 31898 5706f70 31899 5706f96 31898->31899 31902 57062ac 31899->31902 31903 57062b7 31902->31903 31904 5707cc9 31903->31904 31906 5707cb9 31903->31906 31907 5707cc7 31904->31907 31927 57063d4 31904->31927 31911 5707df0 31906->31911 31916 5707ebc 31906->31916 31922 5707de1 31906->31922 31912 5707df1 31911->31912 31931 5707ea8 31912->31931 31935 5707e99 31912->31935 31913 5707e90 31913->31907 31917 5707e7a 31916->31917 31918 5707eca 31916->31918 31920 5707ea8 CallWindowProcW 31917->31920 31921 5707e99 CallWindowProcW 31917->31921 31919 5707e90 31919->31907 31920->31919 31921->31919 31924 5707dec 31922->31924 31923 5707e90 31923->31907 31925 5707ea8 CallWindowProcW 31924->31925 31926 5707e99 CallWindowProcW 31924->31926 31925->31923 31926->31923 31928 57063df 31927->31928 31929 570940a CallWindowProcW 31928->31929 31930 57093b9 31928->31930 31929->31930 31930->31907 31932 5707ea9 31931->31932 31933 5707eb9 31932->31933 31939 570934b 31932->31939 31933->31913 31936 5707ea4 31935->31936 31937 5707eb9 31936->31937 31938 570934b CallWindowProcW 31936->31938 31937->31913 31938->31937 31940 57063d4 CallWindowProcW 31939->31940 31941 570935a 31940->31941 31941->31933 32036 2f8d688 32037 2f8d6a9 32036->32037 32040 2f8706c 32037->32040 32039 2f8d70d 32041 2f87077 32040->32041 32044 2f8709c 32041->32044 32043 2f8d7e2 32043->32039 32045 2f870a7 32044->32045 32046 2f870cc CreateWindowExW 32045->32046 32047 2f8d8e2 32046->32047 32047->32043 31942 570c4a8 31945 2f870cc 31942->31945 31943 570c4bb 31946 2f870d7 31945->31946 31947 2f8e03c 31946->31947 31950 5702470 31946->31950 31955 5702480 31946->31955 31947->31943 31951 570247b 31950->31951 31952 57024c5 31951->31952 31960 5702630 31951->31960 31964 570261f 31951->31964 31952->31947 31956 57024a1 31955->31956 31957 57024c5 31956->31957 31958 5702630 CreateWindowExW 31956->31958 31959 570261f CreateWindowExW 31956->31959 31957->31947 31958->31957 31959->31957 31961 570263d 31960->31961 31962 5702677 31961->31962 31968 57021fc 31961->31968 31962->31952 31965 5702630 31964->31965 31966 57021fc CreateWindowExW 31965->31966 31967 5702677 31965->31967 31966->31967 31967->31952 31969 5702207 31968->31969 31971 5702f68 31969->31971 31972 57022e4 31969->31972 31971->31971 31973 57022ef 31972->31973 31977 5704d50 31973->31977 31982 5704d68 31973->31982 31974 5703010 31974->31971 31978 5704d99 31977->31978 31981 5704da5 31977->31981 31978->31981 31987 5705bb0 31978->31987 31992 5705ba0 31978->31992 31981->31974 31983 5704da5 31982->31983 31984 5704d99 31982->31984 31983->31974 31984->31983 31985 5705bb0 CreateWindowExW 31984->31985 31986 5705ba0 CreateWindowExW 31984->31986 31985->31983 31986->31983 31988 5705bda 31987->31988 31989 5705c81 31988->31989 31997 5706ce0 31988->31997 32006 5706d68 31988->32006 31993 5705ba4 31992->31993 31994 5705c81 31993->31994 31995 5706ce0 CreateWindowExW 31993->31995 31996 5706d68 CreateWindowExW 31993->31996 31995->31994 31996->31994 31998 5706cef 31997->31998 31999 5706d57 31997->31999 31998->31999 32003 5706d0f 31998->32003 32010 5706284 31999->32010 32002 5706d2e 32002->31989 32003->32002 32004 5706284 CreateWindowExW 32003->32004 32005 5706d99 32004->32005 32005->31989 32007 5706d69 32006->32007 32008 5706284 CreateWindowExW 32007->32008 32009 5706d9d 32008->32009 32009->31989 32011 5706db8 CreateWindowExW 32010->32011 32013 5706edc 32011->32013 32014 2f83e50 32016 2f83e64 32014->32016 32015 2f83ee7 32016->32015 32018 2f83fd1 32016->32018 32019 2f83fda 32018->32019 32020 2f84031 32018->32020 32024 2f844d0 32019->32024 32028 2f844c1 32019->32028 32020->32016 32026 2f844f7 32024->32026 32025 2f845d4 32025->32025 32026->32025 32032 2f83e24 32026->32032 32029 2f844d0 32028->32029 32030 2f83e24 CreateActCtxA 32029->32030 32031 2f845d4 32029->32031 32030->32031 32033 2f85560 CreateActCtxA 32032->32033 32035 2f85623 32033->32035 32048 5702748 32049 57027ae 32048->32049 32053 5702908 32049->32053 32056 57028f9 32049->32056 32050 570285d 32060 5702284 32053->32060 32057 5702908 32056->32057 32058 5702284 DuplicateHandle 32057->32058 32059 5702936 32058->32059 32059->32050 32061 5702970 DuplicateHandle 32060->32061 32062 5702936 32061->32062 32062->32050

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 303 5706284-5706e1e 305 5706e20-5706e26 303->305 306 5706e29-5706e30 303->306 305->306 307 5706e32-5706e38 306->307 308 5706e3b-5706eda CreateWindowExW 306->308 307->308 310 5706ee3-5706f1b 308->310 311 5706edc-5706ee2 308->311 315 5706f28 310->315 316 5706f1d-5706f20 310->316 311->310 317 5706f29 315->317 316->315 317->317
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05706ECA
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485786624.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5700000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: a520469a8de4f8bbd2b28c4699e96c611350e35a7cff1c0bf9ccd846d8af7a22
                                                        • Instruction ID: 8cfbfca722a357729c05b23f36364bf30a882aa4a7478093a2183e8dca809a48
                                                        • Opcode Fuzzy Hash: a520469a8de4f8bbd2b28c4699e96c611350e35a7cff1c0bf9ccd846d8af7a22
                                                        • Instruction Fuzzy Hash: 9C51D0B1D00309EFDB14CF99D884ADEBBF5BF48310F24852AE819AB250D771A845CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 318 5706daf-5706e1e 319 5706e20-5706e26 318->319 320 5706e29-5706e30 318->320 319->320 321 5706e32-5706e38 320->321 322 5706e3b-5706e73 320->322 321->322 323 5706e7b-5706eda CreateWindowExW 322->323 324 5706ee3-5706f1b 323->324 325 5706edc-5706ee2 323->325 329 5706f28 324->329 330 5706f1d-5706f20 324->330 325->324 331 5706f29 329->331 330->329 331->331
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05706ECA
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485786624.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5700000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: c1dae934ea3097694dbe11f5572613880700c0547c9d9ffda627a90da7f7d728
                                                        • Instruction ID: 73a90f398e0a62a6edab1adece0ea9c6d5c2091e64872f16f9774ea701e4688d
                                                        • Opcode Fuzzy Hash: c1dae934ea3097694dbe11f5572613880700c0547c9d9ffda627a90da7f7d728
                                                        • Instruction Fuzzy Hash: FA51BEB1D00309DFDB14CFA9D894ADEBBF5BF48314F24862AE819AB250D7759845CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 332 57063d4-57093ac 337 57093b2-57093b7 332->337 338 570945c-570947c call 57062ac 332->338 339 57093b9-57093f0 337->339 340 570940a-5709442 CallWindowProcW 337->340 346 570947f-570948c 338->346 347 57093f2-57093f8 339->347 348 57093f9-5709408 339->348 342 5709444-570944a 340->342 343 570944b-570945a 340->343 342->343 343->346 347->348 348->346
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05709431
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485786624.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5700000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 47a74b718092d3cab7a753de88932bc4cfc4773f40a4666ef5966ceb6f60b59c
                                                        • Instruction ID: af36f077cbc45c3355ad80acb79877b66f19e324d94218036c28e947fbc55b6b
                                                        • Opcode Fuzzy Hash: 47a74b718092d3cab7a753de88932bc4cfc4773f40a4666ef5966ceb6f60b59c
                                                        • Instruction Fuzzy Hash: 234135B4A00305DFCB10CF99C488AAAFBF5FF88314F148559E519AB362D774A841CFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 351 2f83e24-2f85621 CreateActCtxA 354 2f8562a-2f85684 351->354 355 2f85623-2f85629 351->355 362 2f85693-2f85697 354->362 363 2f85686-2f85689 354->363 355->354 364 2f856a8 362->364 365 2f85699-2f856a5 362->365 363->362 367 2f856a9 364->367 365->364 367->367
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 02F85611
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.481672818.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2f80000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: eb8f104ccfe30c84ef08b069095f8970ee71093c42f082398edb98376846511d
                                                        • Instruction ID: e38b2722b0ac0b403aa83103b3b348737f6c2efd53004ce8b28d45ed7f391696
                                                        • Opcode Fuzzy Hash: eb8f104ccfe30c84ef08b069095f8970ee71093c42f082398edb98376846511d
                                                        • Instruction Fuzzy Hash: BE4100B1D00618CBDB20DFA9C884BDEFBB5BF48308F60856AD509AB250D7716945CF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 368 2f85554-2f85621 CreateActCtxA 370 2f8562a-2f85684 368->370 371 2f85623-2f85629 368->371 378 2f85693-2f85697 370->378 379 2f85686-2f85689 370->379 371->370 380 2f856a8 378->380 381 2f85699-2f856a5 378->381 379->378 383 2f856a9 380->383 381->380 383->383
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 02F85611
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.481672818.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_2f80000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 50ec5531b9ed0bc4d70967d684661ebb2b48889d4a5bc696bc18006e6daa88ff
                                                        • Instruction ID: 08fb1bec5aa86db33cbdd6c843877401043945ec96b2ce19a69a29aeae998615
                                                        • Opcode Fuzzy Hash: 50ec5531b9ed0bc4d70967d684661ebb2b48889d4a5bc696bc18006e6daa88ff
                                                        • Instruction Fuzzy Hash: AD410FB1D00618CBDB20DFA9C884BDEBBB5BF48308F20846AD509AB250D771694ACF90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 384 5702284-5702a04 DuplicateHandle 386 5702a06-5702a0c 384->386 387 5702a0d-5702a2a 384->387 386->387
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,05702936,?,?,?,?,?), ref: 057029F7
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485786624.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5700000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: e0c15f859c7d1a5448f92ad5d9600374a42ed8f181b6b20eeac31cb4b2acd066
                                                        • Instruction ID: c6eb1a4787cc2dacf358bebd1f902fa52d1eed9b2f1687f4e97ca6b9fea51bb4
                                                        • Opcode Fuzzy Hash: e0c15f859c7d1a5448f92ad5d9600374a42ed8f181b6b20eeac31cb4b2acd066
                                                        • Instruction Fuzzy Hash: F221E7B5900248DFDB10CFA9D484AEEBBF4EB48320F14841AE915B7351D374A944DFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 390 5702968-570296a 391 5702970-5702a04 DuplicateHandle 390->391 392 5702a06-5702a0c 391->392 393 5702a0d-5702a2a 391->393 392->393
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,05702936,?,?,?,?,?), ref: 057029F7
                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485786624.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5700000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 604e8307f4337bb3530c74f5cb4daaf3000723a08468716423c7fc26b728e0d6
                                                        • Instruction ID: 2fd9cf789130f7a7a12402fd460b6954e02e67d338d274a45c84ac9df8b28880
                                                        • Opcode Fuzzy Hash: 604e8307f4337bb3530c74f5cb4daaf3000723a08468716423c7fc26b728e0d6
                                                        • Instruction Fuzzy Hash: 7F21E5B6900248EFDB10CFA9D884ADEFBF8EB48324F14841AE955B3350D375A944DFA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 610de591ebd7d411a20260c3fc9e9dbe1188b58b62f8b56efc98e6822786066e
                                                        • Instruction ID: 9f41a36775861343a63d7588f8ba03fa2ec1a3b1626b5855eae3269cb2eef870
                                                        • Opcode Fuzzy Hash: 610de591ebd7d411a20260c3fc9e9dbe1188b58b62f8b56efc98e6822786066e
                                                        • Instruction Fuzzy Hash: 64027E74A10214DFDB60EFA5E959B9CBBF5FB48304F0084AAE409AB350EB345D85DF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0cabb568cc234690a112f018b76643a3149b92e325ee90d69bb9b66ca23c8981
                                                        • Instruction ID: b2792cfe78d014e181eb49cb061dd995136fa20b1b0b2b2a7be37f23451d57ab
                                                        • Opcode Fuzzy Hash: 0cabb568cc234690a112f018b76643a3149b92e325ee90d69bb9b66ca23c8981
                                                        • Instruction Fuzzy Hash: D8F17D74A10215DFDB60EFA5E959B9CBBF6FB48304F0084AAE809AB350DB345D85DF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 223100c9f48ecdc4df746482961e9f5ac0a2cf15dea543f308877ce972e6834d
                                                        • Instruction ID: 54e9015131835a30d081870f12311e2dc44dc47fbf73b0c9dca39b68c06b33e4
                                                        • Opcode Fuzzy Hash: 223100c9f48ecdc4df746482961e9f5ac0a2cf15dea543f308877ce972e6834d
                                                        • Instruction Fuzzy Hash: A0F19D74A10215DFDB60EFA5E959B9CBBF6FB48304F0084AAE809A7350DB345D85DF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8a4f60a1a3fd863ce88f5677deac179fb0c63abd9d4b3ad5a1d4779101c4253a
                                                        • Instruction ID: c00faf5ffa846641bebc88be08852bcee879fc2470bdfee36d3ee363fa7c628b
                                                        • Opcode Fuzzy Hash: 8a4f60a1a3fd863ce88f5677deac179fb0c63abd9d4b3ad5a1d4779101c4253a
                                                        • Instruction Fuzzy Hash: 30F18E74A10214CFDB60EFA5E959B9CBBF6FB48304F0085AAE809A7350DB345D85DF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d49fa73f7fd4abcd3157c40ef95a2f1d29e3ff28a067f0d9c77e64f73878b0a9
                                                        • Instruction ID: b3535d0b286ceb1cb953c96ec63e07b9bd2daa968da9df14c8857b57cc39b2a1
                                                        • Opcode Fuzzy Hash: d49fa73f7fd4abcd3157c40ef95a2f1d29e3ff28a067f0d9c77e64f73878b0a9
                                                        • Instruction Fuzzy Hash: 6D419032E0422ADFDB14DFA4D854BFEBBB6BB84300F05C066D515BB284DBB05D02AB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e8bb9bb9003446858241282d69bc389f103fedc4de91a0661a033d16703aa5a
                                                        • Instruction ID: 4f6cec19125aaea6a473b0978056ba27238cd1d262136f21abefb153b791b9fa
                                                        • Opcode Fuzzy Hash: 9e8bb9bb9003446858241282d69bc389f103fedc4de91a0661a033d16703aa5a
                                                        • Instruction Fuzzy Hash: 59317E32E04129DFDB14DFA4C854BBEB7B6BB84310F05C076D50A77284DBB05C52AB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 980d373d801e52f77de00dc006701faee0c8fb9c212bf482a6ba27e821c303d7
                                                        • Instruction ID: d5a625c53a26fef641db1643c7534f94d94a6a27aa6a59b2a8ddb6bb1e141b40
                                                        • Opcode Fuzzy Hash: 980d373d801e52f77de00dc006701faee0c8fb9c212bf482a6ba27e821c303d7
                                                        • Instruction Fuzzy Hash: A5218671E081358FDB01DFA4C585ABEBBB3AF44310F1985B1D909EB242DAB0DD41D792
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fac9e8f5ac67b21c2375f6eea7de5af73c80f39c6edd4ea628995deca146b989
                                                        • Instruction ID: 39878eaaf4511b0d6a39cf9d0f912160a5192f728707ebbc1f72a5b95c4d3195
                                                        • Opcode Fuzzy Hash: fac9e8f5ac67b21c2375f6eea7de5af73c80f39c6edd4ea628995deca146b989
                                                        • Instruction Fuzzy Hash: 3A214F71E041268FDB01DFA4C584A7EBBB3FB44310F158561C50AEB241DAA0DD41EB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2ba84cbd1be6bc6f28a499a117878aca8654a7117bab865d5ecca9ffec284c6
                                                        • Instruction ID: 454971afa848681b06d34b661f74290b51cfe21f831a7eb8264aec9eaf104e6d
                                                        • Opcode Fuzzy Hash: a2ba84cbd1be6bc6f28a499a117878aca8654a7117bab865d5ecca9ffec284c6
                                                        • Instruction Fuzzy Hash: E101A23960E7C84FC31353709D151657F75AF4751534A40C3E099CF6A3CA656C1AEBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2eadd959f361d2429269531162504a3df69ed23eee91dc5b86834014de2a9d2d
                                                        • Instruction ID: cec46b3f8a1f2e812dea840e81c7431eabb5fef4699cd902830983c3427d7b46
                                                        • Opcode Fuzzy Hash: 2eadd959f361d2429269531162504a3df69ed23eee91dc5b86834014de2a9d2d
                                                        • Instruction Fuzzy Hash: C8F04970919708AFD746CFBAA5096DDFFF8BB05204F0181EAD408E3211E7348A84DB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e734d6fd91f3348cc62eaf585d56203185ddca75fa28e082b3dfbc509529bc7
                                                        • Instruction ID: 9808c656bdbf078008fb98e04c1d57eefb48b7cabcbf55c08f80426d3d7456a0
                                                        • Opcode Fuzzy Hash: 9e734d6fd91f3348cc62eaf585d56203185ddca75fa28e082b3dfbc509529bc7
                                                        • Instruction Fuzzy Hash: D6F0156914E3D95FC30353789C214957F786E4750034B00C3E0948F1A3E2546D2AD7B2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7f6df087203ace43a633ac971f41798f7fa7df10b4ce303ee47021769fcf0053
                                                        • Instruction ID: bba4cd40d3b102af48f68e1a5cf9808a500f998553b88e846a0538b138edcb7d
                                                        • Opcode Fuzzy Hash: 7f6df087203ace43a633ac971f41798f7fa7df10b4ce303ee47021769fcf0053
                                                        • Instruction Fuzzy Hash: F3E07574A143199FDB40DFA1D5599ACBBF2FB44304F104529E409AB254DB741D45DF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0fdba8b80e6db4e718637c49f0f4b67378e14f146429675e21bb8286cfd1c0c0
                                                        • Instruction ID: 45924fd09b41dad19414b84fe36eb0b821c02120a3ed40840597c34982e3afbb
                                                        • Opcode Fuzzy Hash: 0fdba8b80e6db4e718637c49f0f4b67378e14f146429675e21bb8286cfd1c0c0
                                                        • Instruction Fuzzy Hash: 82D05E36A887419FD358C624ED4BBC1BB12BF05714F1885DAE10D4EDE2E761A4008646
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6b7b20ca144a59c2eae93a63689674e75c26d82ef7e76ed104dc8c07657df80c
                                                        • Instruction ID: d2c1e4957fe88b320e69e9f10ceedba550982503e53a3d3b56f9668bf822df81
                                                        • Opcode Fuzzy Hash: 6b7b20ca144a59c2eae93a63689674e75c26d82ef7e76ed104dc8c07657df80c
                                                        • Instruction Fuzzy Hash: FFC04C303C0704AFE354DA5ADD47F017B99AF45F14F654091F3089F6F1DAA1F8004548
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                                                        • Instruction ID: 308734e347fe5fbfc39d01466d26648a0473cab39bdc6a53ba3d68073832f9aa
                                                        • Opcode Fuzzy Hash: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                                                        • Instruction Fuzzy Hash: 93B01230240208CFC200DB5DD444C0033FCAF49A0434000D0F1098B731C721FC00CA40
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 07a8d9674cce806bfa20febf6b529e248f538daea709b1a32f0a86d1e129a9e3
                                                        • Instruction ID: 72242dd61bd1274c763f350f4bee64afcbc3e7fcb23d9306e45d84c63f92ecb7
                                                        • Opcode Fuzzy Hash: 07a8d9674cce806bfa20febf6b529e248f538daea709b1a32f0a86d1e129a9e3
                                                        • Instruction Fuzzy Hash: A090023905470C8B46402795740A6567B5CA5445557D48051F50E419019E55A52065D5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000012.00000002.485894738.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_18_2_5720000_YZtXgX.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8601a5d1e2350b8f96b1a564a35d0bf7926d7483e8b39a6201cebfc7a9a5f2a5
                                                        • Instruction ID: b5592d44a8c44b878634bb015829de6319713adac997392b1446080fe7140f9b
                                                        • Opcode Fuzzy Hash: 8601a5d1e2350b8f96b1a564a35d0bf7926d7483e8b39a6201cebfc7a9a5f2a5
                                                        • Instruction Fuzzy Hash: E190023A05470C8B45402795740A656BF5C95445157D0C051F51E419025E66A4106595
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%