Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetectNet.01.21425.740

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetectNet.01.21425.740 (renamed file extension from 740 to exe)
Analysis ID:626308
MD5:3da44c0f1ed72b72ccd424f5aa59d741
SHA1:0ee6faecf98ce05e6f135d80ac354382b48eb159
SHA256:69373d6ff7f903c56ae75d1a25800e1b161c9cfa9d5fed15eb36216937a24714
Tags:exeFormbook
Infos:

Detection

FormBook
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses 32bit PE files
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["www.fragrantneed.com/an49/"], "decoy": ["vfmcxfjaukmccjn.com", "visualdvledtechnology.com", "webfinder.online", "anhuizuche.com", "animalmusts.com", "seaspraylux.com", "paribusproductions.com", "veterinarydoctortiny.com", "valyhags.com", "qhdlvjx.com", "bagsboutique.online", "horibest.com", "niejernen.com", "trivantages.com", "webtesterpro.com", "806425.com", "maystonecounseling.com", "xzvsadt9.com", "lyypu.icu", "emagrecasaudavel.online", "eco2earn.com", "rg74.com", "qqbolazona.net", "consensuspayment.xyz", "organicsroyalty.com", "mysam.net", "tjsgyg.com", "jia-nong.com", "abpositive.life", "citla.net", "threesixtytools.com", "emailchant.com", "usedcarsdepotus.com", "weipaotu.com", "tourmovie.com", "jejelou.net", "treeleo.com", "sydneychaandraat.com", "aurethas.com", "hd1bw6fq7yobfu.xyz", "racetherattler.com", "blightbane.com", "darion.pro", "jayzerel.com", "canzip.online", "bodakelly.com", "movedigitalmedia.com", "reamofe.xyz", "panzoism.com", "crazyjs.xyz", "hu1b7mxq5intpd.xyz", "water168.xyz", "nabirgbroom.com", "nelagarments.com", "drailsashailer.com", "youngmusiad.net", "dadhowto.com", "monolocostore.com", "nichinansemento.com", "52apollo.com", "butlerinu.xyz", "setsnshop.com", "da3a8msr4xek5w.life", "cleburnewalkinshowers.com"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18849:$sqlite3step: 68 34 1C 7B E1
        • 0x1895c:$sqlite3step: 68 34 1C 7B E1
        • 0x18878:$sqlite3text: 68 38 2A 90 C5
        • 0x1899d:$sqlite3text: 68 38 2A 90 C5
        • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
        5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 22 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.fragrantneed.com/an49/"], "decoy": ["vfmcxfjaukmccjn.com", "visualdvledtechnology.com", "webfinder.online", "anhuizuche.com", "animalmusts.com", "seaspraylux.com", "paribusproductions.com", "veterinarydoctortiny.com", "valyhags.com", "qhdlvjx.com", "bagsboutique.online", "horibest.com", "niejernen.com", "trivantages.com", "webtesterpro.com", "806425.com", "maystonecounseling.com", "xzvsadt9.com", "lyypu.icu", "emagrecasaudavel.online", "eco2earn.com", "rg74.com", "qqbolazona.net", "consensuspayment.xyz", "organicsroyalty.com", "mysam.net", "tjsgyg.com", "jia-nong.com", "abpositive.life", "citla.net", "threesixtytools.com", "emailchant.com", "usedcarsdepotus.com", "weipaotu.com", "tourmovie.com", "jejelou.net", "treeleo.com", "sydneychaandraat.com", "aurethas.com", "hd1bw6fq7yobfu.xyz", "racetherattler.com", "blightbane.com", "darion.pro", "jayzerel.com", "canzip.online", "bodakelly.com", "movedigitalmedia.com", "reamofe.xyz", "panzoism.com", "crazyjs.xyz", "hu1b7mxq5intpd.xyz", "water168.xyz", "nabirgbroom.com", "nelagarments.com", "drailsashailer.com", "youngmusiad.net", "dadhowto.com", "monolocostore.com", "nichinansemento.com", "52apollo.com", "butlerinu.xyz", "setsnshop.com", "da3a8msr4xek5w.life", "cleburnewalkinshowers.com"]}
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeVirustotal: Detection: 36%Perma Link
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeReversingLabs: Detection: 41%
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeJoe Sandbox ML: detected
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: CCMDiction.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: Binary string: CCMDiction.pdb(. source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282869497.000000000196F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282332477.0000000001850000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.280338890.00000000016B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.278588709.000000000151B000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282869497.000000000196F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282332477.0000000001850000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.280338890.00000000016B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.278588709.000000000151B000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 4x nop then pop ebx5_2_00407B1A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 4x nop then pop edi5_2_0040E46A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 4x nop then pop edi5_2_00417D8F

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.fragrantneed.com/an49/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.241129650.00000000061E8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.241159928.00000000061E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion?
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoG
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237762346.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.239456169.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237595456.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237693500.000000000620E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237609920.00000000061EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comn
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250763673.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250083360.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250279492.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250915630.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250460300.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250823827.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250185943.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250231636.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250517761.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250691015.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250566257.0000000006219000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.251137378.00000000061E9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250309860.00000000061E8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250704397.00000000061E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.287571934.0000000007C70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000000.232227017.0000000000F84000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCCMDiction.exe6 vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000000.276482809.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCCMDiction.exe6 vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282869497.000000000196F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.283138098.0000000001AFF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.278923764.0000000001631000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.280915296.00000000017D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeBinary or memory string: OriginalFilenameCCMDiction.exe6 vs SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_016A43580_2_016A4358
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_016A40A90_2_016A40A9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_016A40B80_2_016A40B8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_016A43480_2_016A4348
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_090C9CE80_2_090C9CE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_090C76E80_2_090C76E8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_090C00270_2_090C0027
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_004010305_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041E03B5_2_0041E03B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041EB415_2_0041EB41
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041DBDC5_2_0041DBDC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041E4F05_2_0041E4F0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041DCF35_2_0041DCF3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00402D875_2_00402D87
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00402D905_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041D5A35_2_0041D5A3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00409E5B5_2_00409E5B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00409E605_2_00409E60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041DF8D5_2_0041DF8D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00402FB05_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041E7BF5_2_0041E7BF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A360 NtCreateFile,5_2_0041A360
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A410 NtReadFile,5_2_0041A410
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A490 NtClose,5_2_0041A490
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A540 NtAllocateVirtualMemory,5_2_0041A540
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A4BA NtClose,5_2_0041A4BA
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeVirustotal: Detection: 36%
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeReversingLabs: Detection: 41%
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeJump to behavior
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.240010352.000000000620D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0s.slnt
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.logJump to behavior
          Source: classification engineClassification label: mal96.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: CCMDiction.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: Binary string: CCMDiction.pdb(. source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282869497.000000000196F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282332477.0000000001850000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.280338890.00000000016B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.278588709.000000000151B000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282869497.000000000196F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000002.282332477.0000000001850000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.280338890.00000000016B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000005.00000003.278588709.000000000151B000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 0_2_090C3240 push ss; iretd 0_2_090C3241
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00417987 push eax; ret 5_2_00417989
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0040B419 push eax; ret 5_2_0040B41F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041D4B5 push eax; ret 5_2_0041D508
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041D56C push eax; ret 5_2_0041D572
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00417D79 pushfd ; ret 5_2_00417D8C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041D502 push eax; ret 5_2_0041D508
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041D50B push eax; ret 5_2_0041D572
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041A5F7 push esp; ret 5_2_0041A5F8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_004165F6 push edx; iretd 5_2_00416602
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_0041BE2B push FFFFFFC8h; retf 5_2_0041BE2D
          Source: initial sampleStatic PE information: section name: .text entropy: 7.74910295141
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe PID: 3748, type: MEMORYSTR
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe TID: 4180Thread sleep time: -45733s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe TID: 3804Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00409AB0 rdtsc 5_2_00409AB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeThread delayed: delay time: 45733Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeCode function: 5_2_00409AB0 rdtsc 5_2_00409AB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.453be20.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.44b7400.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception11
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
          Software Packing
          NTDS112
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
          Process Injection
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.W32.AIDetectNet.01.21425.exe36%VirustotalBrowse
          SecuriteInfo.com.W32.AIDetectNet.01.21425.exe41%ReversingLabsByteCode-MSIL.Backdoor.Androm
          SecuriteInfo.com.W32.AIDetectNet.01.21425.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.2.SecuriteInfo.com.W32.AIDetectNet.01.21425.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.fontbureau.comoG0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.fonts.comn0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          www.fragrantneed.com/an49/0%Avira URL Cloudsafe
          http://www.fontbureau.comion?0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.fragrantneed.com/an49/true
          • Avira URL Cloud: safe
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.galapagosdesign.com/SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250763673.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250083360.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250279492.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250915630.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250460300.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250823827.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250185943.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250231636.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250517761.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250691015.0000000006219000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250566257.0000000006219000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/?SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.come.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.251137378.00000000061E9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250309860.00000000061E8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.250704397.00000000061E8000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comoGSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.comnSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237609920.00000000061EB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.ascendercorp.com/typedesigners.htmlSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.241129650.00000000061E8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.241159928.00000000061E9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237762346.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.239456169.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237595456.000000000620E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.237693500.000000000620E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comSecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.286022731.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comion?SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000003.279317844.00000000061D0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.21425.exe, 00000000.00000002.285455437.00000000061D0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:626308
                              Start date and time: 13/05/202220:41:112022-05-13 20:41:11 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 36s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:SecuriteInfo.com.W32.AIDetectNet.01.21425.740 (renamed file extension from 740 to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:27
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal96.troj.evad.winEXE@3/1@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 34.1% (good quality ratio 31.9%)
                              • Quality average: 70.1%
                              • Quality standard deviation: 31.4%
                              HCA Information:
                              • Successful, ratio: 86%
                              • Number of executed functions: 30
                              • Number of non-executed functions: 7
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              TimeTypeDescription
                              20:42:26API Interceptor1x Sleep call for process: SecuriteInfo.com.W32.AIDetectNet.01.21425.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.740225558976253
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
                              File size:661504
                              MD5:3da44c0f1ed72b72ccd424f5aa59d741
                              SHA1:0ee6faecf98ce05e6f135d80ac354382b48eb159
                              SHA256:69373d6ff7f903c56ae75d1a25800e1b161c9cfa9d5fed15eb36216937a24714
                              SHA512:f3490b20f09835e183bd67add45146bdf51df4cbf6caf75ed94b59a40b10d49ff5ec2eba99924e572e3f35c73a3ce846cda99aa4ab2ae60001aa8418286ceff8
                              SSDEEP:12288:do2t9Mxsy63OdmqOkMsXCbXBn2vgp86r4NrFHPgsJ6NLAhlCQ9:OHxJnOcXUn2vgu6uvgA6NLKl
                              TLSH:D8E4F17DF9F38E52C70826B6C0D62A1007B44E56E277E3AB2E4501E96D027DBCD4678B
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....~b..............0.............N.... ...@....@.. ....................................@................................
                              Icon Hash:00828e8e8686b000
                              Entrypoint:0x4a2e4e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x627E1ED5 [Fri May 13 09:03:17 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa2e000x4b.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x384.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa60000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0xa2dbb0x1c.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xa0e540xa1000False0.869631939053data7.74910295141IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0xa40000x3840x400False0.3701171875data2.85474815119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xa60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0xa40580x32cdata
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2017
                              Assembly Version1.0.0.0
                              InternalNameCCMDiction.exe
                              FileVersion1.0.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameResetEvent
                              ProductVersion1.0.0.0
                              FileDescriptionResetEvent
                              OriginalFilenameCCMDiction.exe
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:20:42:12
                              Start date:13/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe"
                              Imagebase:0xee0000
                              File size:661504 bytes
                              MD5 hash:3DA44C0F1ED72B72CCD424F5AA59D741
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.280888479.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.283123736.0000000004416000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low

                              Target ID:5
                              Start time:20:42:33
                              Start date:13/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.21425.exe
                              Imagebase:0xd40000
                              File size:661504 bytes
                              MD5 hash:3DA44C0F1ED72B72CCD424F5AA59D741
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.277584447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.278111506.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low

                              Reset < >

                                Execution Graph

                                Execution Coverage:12.5%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:67
                                Total number of Limit Nodes:4
                                execution_graph 11948 16a3f98 11949 16a3f99 11948->11949 11955 16a5568 11949->11955 11960 16a5559 11949->11960 11950 16a3fd3 11966 16a3760 11950->11966 11956 16a5569 11955->11956 11957 16a5588 11956->11957 11958 16a5559 CreateActCtxA 11956->11958 11972 16a5650 11956->11972 11957->11950 11958->11957 11961 16a5562 11960->11961 11963 16a55ca 11960->11963 11962 16a5588 11961->11962 11964 16a5559 CreateActCtxA 11961->11964 11965 16a5650 CreateActCtxA 11961->11965 11962->11950 11964->11962 11965->11962 11967 16a376b 11966->11967 11968 16a5568 CreateActCtxA 11967->11968 11969 16a836e 11968->11969 11990 16a8658 11969->11990 11970 16a8392 11973 16a5654 11972->11973 11975 16a56d0 11973->11975 11978 16a5b50 11973->11978 11982 16a5b41 11973->11982 11975->11957 11980 16a5b51 11978->11980 11979 16a5c54 11979->11979 11980->11979 11986 16a57d4 11980->11986 11984 16a5b44 11982->11984 11983 16a5c54 11983->11983 11984->11983 11985 16a57d4 CreateActCtxA 11984->11985 11985->11983 11987 16a6be0 CreateActCtxA 11986->11987 11989 16a6ca3 11987->11989 11991 16a8668 11990->11991 11996 16a8790 11991->11996 12000 16a86b0 11991->12000 12004 16a86a0 11991->12004 11992 16a868f 11992->11970 11997 16a86ed 11996->11997 11998 16a8705 11997->11998 12008 16a87b8 11997->12008 11998->11992 12001 16a86b1 12000->12001 12002 16a8705 12001->12002 12003 16a87b8 CreateActCtxA 12001->12003 12002->11992 12003->12002 12005 16a86ac 12004->12005 12006 16a8705 12005->12006 12007 16a87b8 CreateActCtxA 12005->12007 12006->11992 12007->12006 12009 16a87bc 12008->12009 12010 16a5568 CreateActCtxA 12009->12010 12011 16a87e8 12010->12011 12012 16a5568 CreateActCtxA 12011->12012 12013 16a87f6 12012->12013 12013->11998 11927 90c8ec8 11928 90c9053 11927->11928 11929 90c8eee 11927->11929 11929->11928 11932 16ac678 SetWindowLongW 11929->11932 11934 90c729c 11929->11934 11933 16ac6e4 11932->11933 11933->11929 11935 90c9148 PostMessageW 11934->11935 11936 90c91b4 11935->11936 11936->11929 11937 16ac3e0 11940 16ac430 11937->11940 11941 16ac498 CreateWindowExW 11940->11941 11943 16ac554 11941->11943 11944 16ae9f0 11945 16aea32 11944->11945 11947 16aea39 11944->11947 11946 16aea8a CallWindowProcW 11945->11946 11945->11947 11946->11947

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 16a4358-16a4379 3 16a437b 0->3 4 16a4380-16a4477 0->4 3->4 6 16a4b8f-16a4bb7 4->6 7 16a447d-16a45dc 4->7 10 16a52af-16a52b8 6->10 51 16a45e2-16a463d 7->51 52 16a4b55-16a4b7f 7->52 12 16a52be-16a52d5 10->12 13 16a4bc5-16a4bce 10->13 15 16a4bd0 13->15 16 16a4bd5-16a4cc9 13->16 15->16 33 16a4ccb-16a4cd7 16->33 34 16a4cf3 16->34 36 16a4cd9-16a4cdf 33->36 37 16a4ce1-16a4ce7 33->37 38 16a4cf9-16a4d19 34->38 39 16a4cf1 36->39 37->39 43 16a4d1b-16a4d74 38->43 44 16a4d79-16a4df3 38->44 39->38 56 16a52ac 43->56 65 16a4e4a-16a4e8d 44->65 66 16a4df5-16a4e48 44->66 58 16a463f 51->58 59 16a4642-16a464d 51->59 63 16a4b8c-16a4b8d 52->63 64 16a4b81 52->64 56->10 58->59 62 16a4a67-16a4a6d 59->62 67 16a4652-16a4670 62->67 68 16a4a73-16a4af0 62->68 63->6 64->63 94 16a4e98-16a4ea1 65->94 66->94 71 16a4672-16a4676 67->71 72 16a46c7-16a46dc 67->72 111 16a4b3f-16a4b45 68->111 71->72 77 16a4678-16a4683 71->77 75 16a46de 72->75 76 16a46e3-16a46f9 72->76 75->76 79 16a46fb 76->79 80 16a4700-16a4717 76->80 81 16a46b9-16a46bf 77->81 79->80 86 16a4719 80->86 87 16a471e-16a4734 80->87 83 16a46c1-16a46c2 81->83 84 16a4685-16a4689 81->84 93 16a4745-16a496b 83->93 88 16a468b 84->88 89 16a468f-16a46a7 84->89 86->87 91 16a473b-16a4742 87->91 92 16a4736 87->92 88->89 95 16a46a9 89->95 96 16a46ae-16a46b6 89->96 91->93 92->91 102 16a49cf-16a49e4 93->102 103 16a496d-16a4971 93->103 98 16a4f01-16a4f10 94->98 95->96 96->81 99 16a4f12-16a4f9a 98->99 100 16a4ea3-16a4ecb 98->100 135 16a511f-16a5128 99->135 104 16a4ecd 100->104 105 16a4ed2-16a4efb 100->105 107 16a49eb-16a4a0c 102->107 108 16a49e6 102->108 103->102 110 16a4973-16a4982 103->110 104->105 105->98 112 16a4a0e 107->112 113 16a4a13-16a4a32 107->113 108->107 114 16a49c1-16a49c7 110->114 115 16a4af2-16a4b3c 111->115 116 16a4b47-16a4b4d 111->116 112->113 121 16a4a39-16a4a59 113->121 122 16a4a34 113->122 118 16a49c9-16a49ca 114->118 119 16a4984-16a4988 114->119 115->111 116->52 124 16a4a64 118->124 125 16a498a-16a498e 119->125 126 16a4992-16a49b3 119->126 127 16a4a5b 121->127 128 16a4a60 121->128 122->121 124->62 125->126 131 16a49ba-16a49be 126->131 132 16a49b5 126->132 127->128 128->124 131->114 132->131 137 16a512e-16a5189 135->137 138 16a4f9f-16a4fb4 135->138 153 16a518b-16a51be 137->153 154 16a51c0-16a51ea 137->154 139 16a4fbd-16a5113 138->139 140 16a4fb6 138->140 157 16a5119 139->157 140->139 142 16a5008-16a5048 140->142 143 16a504d-16a508d 140->143 144 16a5092-16a50d2 140->144 145 16a4fc3-16a5003 140->145 142->157 143->157 144->157 145->157 162 16a51f3-16a5286 153->162 154->162 157->135 166 16a528d-16a52a5 162->166 166->56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID: UUUU
                                • API String ID: 0-1798160573
                                • Opcode ID: 3246d9c677b14579b310d71e9313b748196cbc72f5eae57b7b63b8c9d0e95322
                                • Instruction ID: ad1f255523553307b255cbde9ce1d3c472f4285ad85d7d3bbfcf801f4cde7d70
                                • Opcode Fuzzy Hash: 3246d9c677b14579b310d71e9313b748196cbc72f5eae57b7b63b8c9d0e95322
                                • Instruction Fuzzy Hash: EBA2C575A00228CFDB65CF69CD84A99BBB2FF89304F1581E9D509AB325DB319E81CF40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 632 90c9ce8-90c9d0a 633 90ca0ba-90ca0bf 632->633 634 90c9d10-90c9d4b call 90c766c call 90c767c call 90c9964 632->634 636 90ca0c9-90ca0cc 633->636 637 90ca0c1-90ca0c3 633->637 646 90c9d4d-90c9d57 634->646 647 90c9d5e-90c9d7e 634->647 812 90ca0ce call 90c9ce8 636->812 813 90ca0ce call 90ca100 636->813 637->636 640 90ca0d4-90ca0dc 642 90ca0e2-90ca0e9 640->642 646->647 649 90c9d80-90c9d8a 647->649 650 90c9d91-90c9db1 647->650 649->650 652 90c9dc4-90c9de4 650->652 653 90c9db3-90c9dbd 650->653 655 90c9de6-90c9df0 652->655 656 90c9df7-90c9e00 call 90c9974 652->656 653->652 655->656 659 90c9e24-90c9e2d call 90c9984 656->659 660 90c9e02-90c9e1d call 90c9974 656->660 665 90c9e2f-90c9e4a call 90c9984 659->665 666 90c9e51-90c9e5a call 90c9994 659->666 660->659 665->666 672 90c9e5c-90c9e60 call 90c99a4 666->672 673 90c9e65-90c9e81 666->673 672->673 677 90c9e99-90c9e9d 673->677 678 90c9e83-90c9e89 673->678 681 90c9e9f-90c9eb0 call 90c99b4 677->681 682 90c9eb7-90c9eff 677->682 679 90c9e8d-90c9e8f 678->679 680 90c9e8b 678->680 679->677 680->677 681->682 688 90c9f01 682->688 689 90c9f23-90c9f2a 682->689 690 90c9f04-90c9f0a 688->690 691 90c9f2c-90c9f3b 689->691 692 90c9f41-90c9f4f call 90c99c4 689->692 694 90ca0ea-90ca129 690->694 695 90c9f10-90c9f16 690->695 691->692 700 90c9f59-90c9f83 692->700 701 90c9f51-90c9f53 692->701 703 90ca188-90ca198 694->703 704 90ca12b-90ca14c 694->704 697 90c9f18-90c9f1a 695->697 698 90c9f20-90c9f21 695->698 697->698 698->689 698->690 716 90c9f85-90c9f93 700->716 717 90c9fb0-90c9fcc 700->717 701->700 708 90ca36e-90ca375 703->708 709 90ca19e-90ca1a8 703->709 704->703 711 90ca14e-90ca154 704->711 712 90ca384-90ca397 708->712 713 90ca377-90ca37f call 90c9af8 708->713 714 90ca1aa-90ca1b1 709->714 715 90ca1b2-90ca1bc 709->715 718 90ca156-90ca158 711->718 719 90ca162-90ca167 711->719 713->712 720 90ca3a1-90ca3b7 715->720 721 90ca1c2-90ca202 715->721 716->717 732 90c9f95-90c9fa9 716->732 729 90c9fce-90c9fd8 717->729 730 90c9fdf-90ca006 call 90c99d4 717->730 718->719 723 90ca169-90ca16d 719->723 724 90ca174-90ca181 719->724 734 90ca3bb-90ca414 720->734 750 90ca21a-90ca21e 721->750 751 90ca204-90ca20a 721->751 723->724 724->703 729->730 741 90ca01e-90ca022 730->741 742 90ca008-90ca00e 730->742 732->717 782 90ca416 734->782 747 90ca03d-90ca059 741->747 748 90ca024-90ca036 741->748 745 90ca010 742->745 746 90ca012-90ca014 742->746 745->741 746->741 760 90ca05b-90ca061 747->760 761 90ca071-90ca075 747->761 748->747 756 90ca24b-90ca263 call 90c9ae8 750->756 757 90ca220-90ca245 750->757 754 90ca20c 751->754 755 90ca20e-90ca210 751->755 754->750 755->750 772 90ca265-90ca26a 756->772 773 90ca270-90ca278 756->773 757->756 764 90ca065-90ca067 760->764 765 90ca063 760->765 761->642 766 90ca077-90ca085 761->766 764->761 765->761 774 90ca097-90ca09b 766->774 775 90ca087-90ca095 766->775 772->773 776 90ca28e-90ca2ad 773->776 777 90ca27a-90ca288 773->777 779 90ca0a1-90ca0b9 774->779 775->774 775->779 784 90ca2af-90ca2b5 776->784 785 90ca2c5-90ca2c9 776->785 777->776 787 90ca41d-90ca442 782->787 788 90ca418-90ca41c 782->788 789 90ca2b9-90ca2bb 784->789 790 90ca2b7 784->790 793 90ca2cb-90ca2d8 785->793 794 90ca322-90ca36b 785->794 791 90ca449-90ca47f 787->791 792 90ca444 787->792 788->787 789->785 790->785 802 90ca489 791->802 803 90ca481 791->803 792->791 799 90ca30e-90ca31b 793->799 800 90ca2da-90ca30c 793->800 794->708 799->794 800->799 806 90ca48a 802->806 803->802 806->806 812->640 813->640
                                Memory Dump Source
                                • Source File: 00000000.00000002.288175109.00000000090C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 090C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_90c0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 334fc05c97b3581815d4d9cc6b38226cdfed6288a7e82fc7de0b01d223ecdd3c
                                • Instruction ID: 96f50255cd195dd665773ccc904cfbb8e82103e68dac07eca1f3b85d9a24cc28
                                • Opcode Fuzzy Hash: 334fc05c97b3581815d4d9cc6b38226cdfed6288a7e82fc7de0b01d223ecdd3c
                                • Instruction Fuzzy Hash: 6C32AAB0B012089FDB15DFA9C554BAEB7F6AF89700F24886DE1069B3A1CB35ED05CB51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 940 90c76e8-90c7719 941 90c771b 940->941 942 90c7720-90c7784 940->942 941->942 944 90c7892-90c7893 942->944 945 90c7838-90c7853 944->945 946 90c7753-90c775c 945->946 947 90c775e 946->947 948 90c7765-90c7766 946->948 947->945 947->948 949 90c7768-90c796b 947->949 950 90c7858-90c7886 947->950 951 90c7814-90c7815 947->951 952 90c7817-90c781e 947->952 953 90c7830-90c7837 947->953 954 90c77c3-90c7808 947->954 948->949 969 90c7970-90c798a 949->969 950->946 959 90c788c 950->959 951->953 952->950 955 90c7820-90c782b 952->955 954->946 961 90c780e-90c780f 954->961 955->946 959->944 961->946 970 90c8418-90c841f 969->970 971 90c7d2e-90c817f 970->971 972 90c8425-90c8430 970->972 973 90c7998-90c79a1 971->973 985 90c8185 971->985 972->973 975 90c79aa-90c8535 973->975 976 90c79a3 973->976 976->945 976->949 976->950 976->951 976->952 976->953 976->954 976->975 985->970
                                Memory Dump Source
                                • Source File: 00000000.00000002.288175109.00000000090C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 090C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_90c0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c9e16cb59b34dd7cfe483ef9c8c9a7aed831246bff821d090619480dec9fb8b
                                • Instruction ID: 94b1cccf15a9deacb8f53fdf2d91e1e40496716184223e6541d45669dc88a44b
                                • Opcode Fuzzy Hash: 4c9e16cb59b34dd7cfe483ef9c8c9a7aed831246bff821d090619480dec9fb8b
                                • Instruction Fuzzy Hash: 3C9122B0E05229CFDB64CF65D884BEDB7F6AB89300F1096AA951DA7240DB745AC5CF40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 167 16ac430-16ac496 168 16ac498-16ac49e 167->168 169 16ac4a1-16ac4a8 167->169 168->169 170 16ac4aa-16ac4b0 169->170 171 16ac4b3-16ac552 CreateWindowExW 169->171 170->171 173 16ac55b-16ac593 171->173 174 16ac554-16ac55a 171->174 178 16ac5a0 173->178 179 16ac595-16ac598 173->179 174->173 179->178
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 016AC542
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 618538e3bb7e3813d90f33f0f661cef48e55ca75d9f5eb9d2c81937282b6ccc3
                                • Instruction ID: 03016cdd79200e63645703abbbee615a118f4977a9bb6e181f3950aef8b4b092
                                • Opcode Fuzzy Hash: 618538e3bb7e3813d90f33f0f661cef48e55ca75d9f5eb9d2c81937282b6ccc3
                                • Instruction Fuzzy Hash: C841CFB1D103099FDF14CF99C984ADEBBB5BF88314F64822AE819AB310D7749845CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 198 16a6bd7-16a6bde 199 16a6be0-16a6be4 198->199 200 16a6be5-16a6ca1 CreateActCtxA 198->200 199->200 202 16a6caa-16a6d04 200->202 203 16a6ca3-16a6ca9 200->203 210 16a6d13-16a6d17 202->210 211 16a6d06-16a6d09 202->211 203->202 212 16a6d28 210->212 213 16a6d19-16a6d25 210->213 211->210 215 16a6d29 212->215 213->212 215->215
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 016A6C91
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: f28ab5ba2ac4e1f4174d060cef90d81e3aa546a992ff0a0a5ead9feabb23938f
                                • Instruction ID: 635d4b431e38dd00e5d09461da8f6da20a80770d85bce0c514486c113efcff7c
                                • Opcode Fuzzy Hash: f28ab5ba2ac4e1f4174d060cef90d81e3aa546a992ff0a0a5ead9feabb23938f
                                • Instruction Fuzzy Hash: 7241F271C04618CFDB24DFA9C844BDEBBB1FF89308F558069D409AB250D7756949CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 180 16a57d4-16a6ca1 CreateActCtxA 184 16a6caa-16a6d04 180->184 185 16a6ca3-16a6ca9 180->185 192 16a6d13-16a6d17 184->192 193 16a6d06-16a6d09 184->193 185->184 194 16a6d28 192->194 195 16a6d19-16a6d25 192->195 193->192 197 16a6d29 194->197 195->194 197->197
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 016A6C91
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 746a1926d0227baad829095a7aa0cbe3285d3c503744cdc5e0c00499c94b8004
                                • Instruction ID: f4376462fab949cefa4344f5b84733edfd9df6e5123d796a22710a3049aa9e9f
                                • Opcode Fuzzy Hash: 746a1926d0227baad829095a7aa0cbe3285d3c503744cdc5e0c00499c94b8004
                                • Instruction Fuzzy Hash: 41410271C04218CFDB24DFA9C844BDEBBB1FF88308F548469D409AB250D7756949CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 216 16ae9f0-16aea2c 217 16aeadc-16aeafc 216->217 218 16aea32-16aea37 216->218 224 16aeaff-16aeb0c 217->224 219 16aea8a-16aeac2 CallWindowProcW 218->219 220 16aea39-16aea70 218->220 221 16aeacb-16aeada 219->221 222 16aeac4-16aeaca 219->222 227 16aea79-16aea88 220->227 228 16aea72-16aea78 220->228 221->224 222->221 227->224 228->227
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 016AEAB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 855c3edc386961e66fb76a0b3d8ae3f4d08e239abd6dc05fa4026e43c4ee29f8
                                • Instruction ID: 5f4299b0a64f66f8d61616e7099e316e87f280fa0a6d86294f73cfdf1c1a57f0
                                • Opcode Fuzzy Hash: 855c3edc386961e66fb76a0b3d8ae3f4d08e239abd6dc05fa4026e43c4ee29f8
                                • Instruction Fuzzy Hash: 744116B4A003059FDB14CF99C888AAABBF5FF89314F14C559D919AB321D775AC41CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 230 90c729c-90c91b2 PostMessageW 232 90c91bb-90c91cf 230->232 233 90c91b4-90c91ba 230->233 233->232
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 090C91A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.288175109.00000000090C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 090C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_90c0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 5bd4cfdfe1e511906bdde27e6da1ac4298edc5da5b76de84ea88db31e4b765b7
                                • Instruction ID: 23c81f8c77eb30148bb360366e1c5fad66fb067226365b34e9b86b7ddac77a00
                                • Opcode Fuzzy Hash: 5bd4cfdfe1e511906bdde27e6da1ac4298edc5da5b76de84ea88db31e4b765b7
                                • Instruction Fuzzy Hash: 8711D3B58003499FDB10CF99C889BDEBBF8EB58324F548859E915A7700C375A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 235 16ac678-16ac6e2 SetWindowLongW 236 16ac6eb-16ac6ff 235->236 237 16ac6e4-16ac6ea 235->237 237->236
                                APIs
                                • SetWindowLongW.USER32(?,?,?), ref: 016AC6D5
                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: LongWindow
                                • String ID:
                                • API String ID: 1378638983-0
                                • Opcode ID: 1caa51041a665a0090f8b7c3d0f3eecf29168fabdf0b84df20ef223a64f896ef
                                • Instruction ID: e1942589d86b7ebf12ad5628c2795b7d2049eaf399b02035bf87830ef4e80002
                                • Opcode Fuzzy Hash: 1caa51041a665a0090f8b7c3d0f3eecf29168fabdf0b84df20ef223a64f896ef
                                • Instruction Fuzzy Hash: 651100B58002489FDB10CF99C988BDFBBF8EB88324F10851AD915A7300C374A944CFA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0cc239b4a03e687b69ff64ccdb5c681967da25edac181264d86b03702ec25982
                                • Instruction ID: 0dfc7a3cdbc43476986dc3b386aeb7a3267670084ac3f2dc3f86735691e10cb5
                                • Opcode Fuzzy Hash: 0cc239b4a03e687b69ff64ccdb5c681967da25edac181264d86b03702ec25982
                                • Instruction Fuzzy Hash: D121D671504244DFDB06CFD4D9C4B2ABBB5FB88328F248569ED054F296C337D856CAA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5b232fea27c2a8b0a79ee9c37e4076e8a2aa94912a9fcf6f2d62fcd3aead2c52
                                • Instruction ID: 1b77e7e736b89ca6ff31342743e184245c6c2eb850f7d1c8aeebfb5f508ae339
                                • Opcode Fuzzy Hash: 5b232fea27c2a8b0a79ee9c37e4076e8a2aa94912a9fcf6f2d62fcd3aead2c52
                                • Instruction Fuzzy Hash: 092133B1504204EFCB02DFD4D9C0B6ABBB1FB84324F25C969E9094F287C376E846C6A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280531727.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_151d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d39ee72df2dc5b22f4b46b249a5c05f21135b08bbd8de8d9544188255df2bba6
                                • Instruction ID: 58e04b1a5d537f96d51c3e0e6a51eae6ea6d28905048ef8a1f534af2e1f0b3f6
                                • Opcode Fuzzy Hash: d39ee72df2dc5b22f4b46b249a5c05f21135b08bbd8de8d9544188255df2bba6
                                • Instruction Fuzzy Hash: 6C213771504200DFEB02CF94D5C8B6ABBB1FB84324F20CA6DD9194F24AC33AD846CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280531727.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_151d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8209c12b9f881da62992f7035e03d9287159dd2cdce59da3aaa0e1e17e577c59
                                • Instruction ID: 20051786a957fc35bae42c80dffb1cf8c91772916482a4101c027a790c7e8b96
                                • Opcode Fuzzy Hash: 8209c12b9f881da62992f7035e03d9287159dd2cdce59da3aaa0e1e17e577c59
                                • Instruction Fuzzy Hash: 89212575504204DFEB16CF64D9C8B26BBB1FB84364F20C96DD9094F24AD33BD846CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280531727.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_151d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 128919bb88b98c9b36c7b59eb0f42faf7387478f6ea57d6743b20a7e92e48550
                                • Instruction ID: b4c125bf97ddc6d56cc8d1e8847f6fd3b85f6199ba163a69fe008723bbc2dcab
                                • Opcode Fuzzy Hash: 128919bb88b98c9b36c7b59eb0f42faf7387478f6ea57d6743b20a7e92e48550
                                • Instruction Fuzzy Hash: C9218E755093808FDB03CF24D994B15BF71FB46214F28C6EAD8498F667C33A984ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                • Instruction ID: aeb727dbe101d860ed748b285f6bd824fecea609f1d2e20bdb75756f8c18fa56
                                • Opcode Fuzzy Hash: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                • Instruction Fuzzy Hash: BB11AF76504280CFCB16CF94D5C4B1ABF71FB84324F2486A9DC050B656C33AD456CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                • Instruction ID: b1bf504653b56a8fdc7e822343b030504535c10c49926143f7071feb9195524e
                                • Opcode Fuzzy Hash: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                • Instruction Fuzzy Hash: 3411B176504284DFCB06CF94D9C4B5ABF72FB84320F24C6A9D8080B657C37AE45ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280531727.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_151d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                • Instruction ID: d05868b9469826f91cdaafcb199f5f36e79200e7900ce9ddea5ca1bb71cd3d71
                                • Opcode Fuzzy Hash: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                • Instruction Fuzzy Hash: 8B11BB75904280DFDB02CF54C5C4B59BBB1FB84224F28C6A9D8594B65AC33AD84ACB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3243738df055bda17e7d7b9605fdcb81f1e35dda7573d6a97c6cf28d292150a9
                                • Instruction ID: ef47c19eca6c63b2043366bc05c6e6069bcb78691279b1844230aecef1145297
                                • Opcode Fuzzy Hash: 3243738df055bda17e7d7b9605fdcb81f1e35dda7573d6a97c6cf28d292150a9
                                • Instruction Fuzzy Hash: F901F7710083849AE7124EE9CD84B6AFBE8FF81278F08855AEE055E287C3799840C6B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280506353.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_150d000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b140b15c11d13ec764cf7dbe0caa02e2c849aef65e962ed10779671083e05bf9
                                • Instruction ID: 043f4fcbd793a467b013b02ac1080369e66f4c8b4e31bc11d98085d019206799
                                • Opcode Fuzzy Hash: b140b15c11d13ec764cf7dbe0caa02e2c849aef65e962ed10779671083e05bf9
                                • Instruction Fuzzy Hash: 17F062714042849AE7158E99CC84B66FFE8EB81674F18C55AED085F287C3799844CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 53b1d08d21fecc02390dc72828b17c758c367a5357f37a4eccd08ee413b8ab72
                                • Instruction ID: 25de67c97b160489faa5d73a7eb73cc0f30a87286591a680a7cfcf63f4c5b8a5
                                • Opcode Fuzzy Hash: 53b1d08d21fecc02390dc72828b17c758c367a5357f37a4eccd08ee413b8ab72
                                • Instruction Fuzzy Hash: DCC16475E006288FDB58CF6ACD84A99BBF2AF89300F54C0A9D509AB325DB305E81CF50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 56ef6d66c7d07f46691eb7513a1cc93cb1c750c5172d2fef50759066f7aeb5c0
                                • Instruction ID: 1f4c9c9f1810f74c1d557185d08f93182985c39d7052fc6600a52addeb2fd28f
                                • Opcode Fuzzy Hash: 56ef6d66c7d07f46691eb7513a1cc93cb1c750c5172d2fef50759066f7aeb5c0
                                • Instruction Fuzzy Hash: B5614B71E002098FD74ADFAAE94469ABBF3FBC8304F05C429C514AF264EB74594A9F91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.280707034.00000000016A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_16a0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 82faf4c340ae37b205239a015e3a3d7c6a599d1c060d3c1589f52eba4badc392
                                • Instruction ID: f5683e8627f913a8b999e1bcd9ca6e0c0fd9b586941b2db067c98bd6b7a6b44d
                                • Opcode Fuzzy Hash: 82faf4c340ae37b205239a015e3a3d7c6a599d1c060d3c1589f52eba4badc392
                                • Instruction Fuzzy Hash: EC616C71E002098FD749DFAAE544A9ABBF3FBC8304F05C439C514AF268EB7459099F91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.288175109.00000000090C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 090C0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_90c0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dac16fdfe5411b787b6cf4e439dad8387b1c28641cf44c8fb96eb411350762ab
                                • Instruction ID: eeb83b6d2cf2e226279b842c6c07d82cadfb9cca4f47aee5c0473ae2ad7deead
                                • Opcode Fuzzy Hash: dac16fdfe5411b787b6cf4e439dad8387b1c28641cf44c8fb96eb411350762ab
                                • Instruction Fuzzy Hash: FC412271D05B548FEB5CCF6B8C4069AFAF3AFC9201F18C1BAD40CA6265EB3415858F11
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Execution Graph

                                Execution Coverage:3.3%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:4.4%
                                Total number of Nodes:298
                                Total number of Limit Nodes:29
                                execution_graph 17538 41f0c0 17541 41b970 17538->17541 17540 41f0cb 17542 41b996 17541->17542 17547 409d40 17542->17547 17544 41b9a2 17546 41b9b5 17544->17546 17553 40c1c0 17544->17553 17546->17540 17567 409c90 17547->17567 17549 409d54 17549->17544 17550 409d4d 17550->17549 17574 40f180 17550->17574 17554 40c1e5 17553->17554 17566 40c445 17554->17566 17803 408a60 17554->17803 17556 40c348 17557 41bdc0 RtlFreeHeap 17556->17557 17559 40c355 17557->17559 17558 40c2eb 17558->17556 17560 40c392 17558->17560 17563 40c3a2 17558->17563 17558->17566 17559->17546 17561 41bdc0 RtlFreeHeap 17560->17561 17562 40c399 17561->17562 17562->17546 17563->17556 17564 40c421 17563->17564 17565 41bdc0 RtlFreeHeap 17564->17565 17565->17566 17566->17546 17569 409ca3 17567->17569 17568 409cb6 17568->17550 17569->17568 17578 41b2b0 17569->17578 17571 409cf3 17571->17568 17587 409ab0 17571->17587 17573 409d13 17573->17550 17576 40f199 17574->17576 17575 409d65 17575->17544 17576->17575 17577 41a490 NtClose 17576->17577 17577->17575 17579 41b2c9 17578->17579 17590 414a50 17579->17590 17581 41b2e1 17582 41b2ea 17581->17582 17619 41b0f0 17581->17619 17582->17571 17584 41b2fe 17584->17582 17631 41bdc0 17584->17631 17589 409aca 17587->17589 17796 407ea0 17587->17796 17589->17573 17591 414a64 17590->17591 17592 414b73 17590->17592 17591->17592 17634 41a360 17591->17634 17592->17581 17594 414bb7 17595 41bdc0 RtlFreeHeap 17594->17595 17601 414bc3 17595->17601 17596 414d49 17597 41a490 NtClose 17596->17597 17599 414d50 17597->17599 17598 414d5f 17692 414790 17598->17692 17599->17581 17601->17592 17601->17596 17601->17598 17603 414c52 17601->17603 17602 414d72 17602->17581 17604 414cb9 17603->17604 17605 414c61 17603->17605 17604->17596 17612 414ccc 17604->17612 17606 414c66 17605->17606 17607 414c7a 17605->17607 17679 414650 17606->17679 17608 414c97 17607->17608 17609 414c7f 17607->17609 17608->17599 17647 414410 17608->17647 17637 4146f0 17609->17637 17689 41a490 17612->17689 17613 414c70 17613->17581 17614 414c8d 17614->17581 17616 414caf 17616->17581 17618 414d38 17618->17581 17620 41b101 17619->17620 17621 41b113 17620->17621 17738 41bd40 17620->17738 17621->17584 17623 41b134 17741 414070 17623->17741 17625 41b180 17625->17584 17626 41b157 17626->17625 17627 414070 2 API calls 17626->17627 17629 41b179 17627->17629 17629->17625 17766 415390 17629->17766 17630 41b20a 17630->17584 17630->17630 17793 41a670 17631->17793 17633 41b359 17633->17571 17719 41af60 17634->17719 17636 41a37c NtCreateFile 17636->17594 17638 41470c 17637->17638 17639 414734 17638->17639 17640 414748 17638->17640 17642 41a490 NtClose 17639->17642 17641 41a490 NtClose 17640->17641 17643 414751 17641->17643 17644 41473d 17642->17644 17721 41bfd0 17643->17721 17644->17614 17646 41475c 17646->17614 17648 41445b 17647->17648 17649 41448e 17647->17649 17651 41a490 NtClose 17648->17651 17650 4144aa 17649->17650 17658 4145d9 17649->17658 17653 4144e1 17650->17653 17654 4144cc 17650->17654 17652 41447f 17651->17652 17652->17616 17656 4144e6 17653->17656 17657 4144fc 17653->17657 17655 41a490 NtClose 17654->17655 17659 4144d5 17655->17659 17660 41a490 NtClose 17656->17660 17666 414501 17657->17666 17727 41bf90 17657->17727 17662 41a490 NtClose 17658->17662 17659->17616 17661 4144ef 17660->17661 17661->17616 17665 414639 17662->17665 17665->17616 17672 414513 17666->17672 17730 41a410 17666->17730 17667 414567 17668 414585 17667->17668 17669 41459a 17667->17669 17670 41a490 NtClose 17668->17670 17671 41a490 NtClose 17669->17671 17670->17672 17673 4145a3 17671->17673 17672->17616 17674 4145cf 17673->17674 17733 41bb90 17673->17733 17674->17616 17676 4145ba 17677 41bdc0 RtlFreeHeap 17676->17677 17678 4145c3 17677->17678 17678->17616 17680 41468d 17679->17680 17681 414694 17680->17681 17682 4146a8 17680->17682 17683 41a490 NtClose 17681->17683 17685 41a490 NtClose 17682->17685 17684 41469d 17683->17684 17684->17613 17686 4146d2 17685->17686 17687 41a490 NtClose 17686->17687 17688 4146dc 17687->17688 17688->17613 17690 41af60 17689->17690 17691 41a4ac NtClose 17690->17691 17691->17618 17693 4147ce 17692->17693 17694 4147d7 17693->17694 17695 4147ec 17693->17695 17696 41a490 NtClose 17694->17696 17697 414810 17695->17697 17698 41485a 17695->17698 17707 4147e0 17696->17707 17703 41a490 NtClose 17697->17703 17699 4148a0 17698->17699 17700 41485f 17698->17700 17702 4148b2 17699->17702 17706 4149da 17699->17706 17701 41a410 NtReadFile 17700->17701 17700->17707 17704 41488a 17701->17704 17709 4148b7 17702->17709 17710 4148f2 17702->17710 17703->17707 17705 41a490 NtClose 17704->17705 17708 414893 17705->17708 17706->17707 17711 41a410 NtReadFile 17706->17711 17707->17602 17708->17602 17712 41a490 NtClose 17709->17712 17710->17707 17716 41a490 NtClose 17710->17716 17713 414a31 17711->17713 17714 4148e3 17712->17714 17715 41a490 NtClose 17713->17715 17714->17602 17717 414a3a 17715->17717 17718 414925 17716->17718 17717->17602 17718->17602 17720 41af70 17719->17720 17720->17636 17722 41bfea 17721->17722 17724 41a630 17721->17724 17722->17646 17725 41a636 17724->17725 17726 41a64c RtlAllocateHeap 17725->17726 17726->17722 17728 41a630 RtlAllocateHeap 17727->17728 17729 41bfa8 17727->17729 17728->17729 17729->17666 17731 41af60 17730->17731 17732 41a42c NtReadFile 17731->17732 17732->17667 17734 41bbb4 17733->17734 17735 41bb9d 17733->17735 17734->17676 17735->17734 17736 41bf90 RtlAllocateHeap 17735->17736 17737 41bbcb 17736->17737 17737->17676 17776 41a540 17738->17776 17740 41bd6d 17740->17623 17742 414081 17741->17742 17743 414089 17741->17743 17742->17626 17765 41435c 17743->17765 17779 41cf30 17743->17779 17745 4140dd 17746 41cf30 RtlAllocateHeap 17745->17746 17749 4140e8 17746->17749 17747 414136 17750 41cf30 RtlAllocateHeap 17747->17750 17749->17747 17784 41cfd0 17749->17784 17752 41414a 17750->17752 17751 41cf30 RtlAllocateHeap 17754 4141bd 17751->17754 17752->17751 17753 41cf30 RtlAllocateHeap 17755 414205 17753->17755 17754->17753 17790 41cf90 17755->17790 17758 41cf90 RtlFreeHeap 17759 41433e 17758->17759 17760 41cf90 RtlFreeHeap 17759->17760 17761 414348 17760->17761 17762 41cf90 RtlFreeHeap 17761->17762 17763 414352 17762->17763 17764 41cf90 RtlFreeHeap 17763->17764 17764->17765 17765->17626 17767 4153a1 17766->17767 17768 414a50 5 API calls 17767->17768 17770 4153b7 17768->17770 17769 41540a 17769->17630 17770->17769 17771 4153f2 17770->17771 17772 415405 17770->17772 17774 41bdc0 RtlFreeHeap 17771->17774 17773 41bdc0 RtlFreeHeap 17772->17773 17773->17769 17775 4153f7 17774->17775 17775->17630 17777 41af60 17776->17777 17778 41a55c NtAllocateVirtualMemory 17777->17778 17778->17740 17780 41cf40 17779->17780 17781 41cf46 17779->17781 17780->17745 17782 41bf90 RtlAllocateHeap 17781->17782 17783 41cf6c 17782->17783 17783->17745 17785 41cff5 17784->17785 17788 41d02d 17784->17788 17786 41bf90 RtlAllocateHeap 17785->17786 17787 41d00a 17786->17787 17789 41bdc0 RtlFreeHeap 17787->17789 17788->17749 17789->17788 17791 41bdc0 RtlFreeHeap 17790->17791 17792 414334 17791->17792 17792->17758 17794 41af60 17793->17794 17795 41a68c RtlFreeHeap 17794->17795 17795->17633 17797 407eb0 17796->17797 17798 407eab 17796->17798 17799 41bd40 NtAllocateVirtualMemory 17797->17799 17798->17589 17800 407ed5 17799->17800 17801 41bd40 NtAllocateVirtualMemory 17800->17801 17802 407f38 17800->17802 17801->17800 17802->17589 17810 4087a0 17803->17810 17805 408a79 17806 408a9d 17805->17806 17807 4087a0 6 API calls 17805->17807 17806->17558 17808 408a8a 17807->17808 17808->17806 17819 40f710 17808->17819 17811 407ea0 NtAllocateVirtualMemory 17810->17811 17817 4087ba 17810->17817 17811->17817 17812 408a3f 17812->17805 17814 41a490 NtClose 17814->17817 17816 40c4c0 NtClose 17816->17817 17817->17812 17817->17814 17817->17816 17826 4085d0 17817->17826 17834 40f5f0 17817->17834 17838 4083a0 17817->17838 17820 40f735 17819->17820 17821 4081a0 5 API calls 17820->17821 17824 40f759 17821->17824 17822 40f766 17822->17806 17823 414a50 5 API calls 17823->17824 17824->17822 17824->17823 17825 41bdc0 RtlFreeHeap 17824->17825 17825->17824 17827 4085e6 17826->17827 17845 419880 17827->17845 17829 4085ff 17833 408713 17829->17833 17864 4081a0 17829->17864 17831 4086e5 17832 4083a0 5 API calls 17831->17832 17831->17833 17832->17833 17833->17817 17835 40f634 17834->17835 17836 41a490 NtClose 17835->17836 17837 40f655 17835->17837 17836->17837 17837->17817 17841 4083c9 17838->17841 17839 408467 17839->17817 17840 41a490 NtClose 17842 40849a 17840->17842 17841->17839 17841->17840 17842->17839 17843 414a50 5 API calls 17842->17843 17844 4085b8 17843->17844 17844->17817 17846 41bf90 RtlAllocateHeap 17845->17846 17847 419897 17846->17847 17871 409310 17847->17871 17849 4198b2 17850 4198f0 17849->17850 17851 4198d9 17849->17851 17854 41bd40 NtAllocateVirtualMemory 17850->17854 17852 41bdc0 RtlFreeHeap 17851->17852 17853 4198e6 17852->17853 17853->17829 17855 41992a 17854->17855 17856 41bd40 NtAllocateVirtualMemory 17855->17856 17857 419943 17856->17857 17858 419bd0 17857->17858 17861 419be4 17857->17861 17859 41bdc0 RtlFreeHeap 17858->17859 17860 419bda 17859->17860 17860->17829 17862 41bdc0 RtlFreeHeap 17861->17862 17863 419c39 17862->17863 17863->17829 17865 40829f 17864->17865 17866 4081b5 17864->17866 17865->17831 17866->17865 17867 414a50 5 API calls 17866->17867 17868 408222 17867->17868 17869 41bdc0 RtlFreeHeap 17868->17869 17870 408249 17868->17870 17869->17870 17870->17831 17872 409335 17871->17872 17874 40938d 17872->17874 17875 40cf20 17872->17875 17874->17849 17877 40cf4c 17875->17877 17876 40cf6c 17876->17874 17877->17876 17878 41a490 NtClose 17877->17878 17879 40cfca 17878->17879 17879->17874

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 41a410-41a459 call 41af60 NtReadFile
                                C-Code - Quality: 37%
                                			E0041A410(intOrPtr _a4, char _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, char _a32, intOrPtr _a36, char _a40) {
                                				void* _t18;
                                				void* _t27;
                                				intOrPtr* _t28;
                                
                                				_t13 = _a4;
                                				_t28 = _a4 + 0xc48;
                                				E0041AF60(_t27, _t13, _t28,  *((intOrPtr*)(_t13 + 0x10)), 0, 0x2a);
                                				_t4 =  &_a40; // 0x414a31
                                				_t6 =  &_a32; // 0x414d72
                                				_t12 =  &_a8; // 0x414d72
                                				_t18 =  *((intOrPtr*)( *_t28))( *_t12, _a12, _a16, _a20, _a24, _a28,  *_t6, _a36,  *_t4); // executed
                                				return _t18;
                                			}






                                0x0041a413
                                0x0041a41f
                                0x0041a427
                                0x0041a42c
                                0x0041a432
                                0x0041a44d
                                0x0041a455
                                0x0041a459

                                APIs
                                • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileRead
                                • String ID: 1JA$rMA$rMA
                                • API String ID: 2738559852-782607585
                                • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction ID: c6e97d42c3e85b78cd3a41c20c82dd28da71633a8e67c8174f08c115ef6e08ba
                                • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction Fuzzy Hash: 87F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 146 41a4ba-41a4bd 147 41a4a4 146->147 148 41a4bf-41a4d6 146->148 149 41a4ac-41a4b9 NtClose 147->149 150 41a4a7 call 41af60 147->150 151 41a4dc-41a4fd 148->151 152 41a4d7 call 41af60 148->152 150->149 152->151
                                APIs
                                • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: 3270553e6907baba3d163c397d5d1d2012c54fd6dde9be7e4f8c7a0e7591ca55
                                • Instruction ID: 82222c4eb3257125cdcdf6e87fd2f8865e389c42c2f928f8af9db81bec536a5b
                                • Opcode Fuzzy Hash: 3270553e6907baba3d163c397d5d1d2012c54fd6dde9be7e4f8c7a0e7591ca55
                                • Instruction Fuzzy Hash: BD0181B52001086FCB10DF98DC81DEB77A9EF88324F208559F94D97242C635E8518BA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 154 41a360-41a3b1 call 41af60 NtCreateFile
                                C-Code - Quality: 100%
                                			E0041A360(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                				long _t21;
                                				void* _t31;
                                
                                				_t3 = _a4 + 0xc40; // 0xc40
                                				E0041AF60(_t31, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x28);
                                				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                				return _t21;
                                			}





                                0x0041a36f
                                0x0041a377
                                0x0041a3ad
                                0x0041a3b1

                                APIs
                                • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction ID: 1571a74e51eef41835f20cf1113afde9e84efeac6e640e2865a3d9423fa4fe5b
                                • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction Fuzzy Hash: FEF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 157 41a540-41a57d call 41af60 NtAllocateVirtualMemory
                                C-Code - Quality: 100%
                                			E0041A540(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                				long _t14;
                                				void* _t21;
                                
                                				_t3 = _a4 + 0xc60; // 0xca0
                                				E0041AF60(_t21, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x30);
                                				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                				return _t14;
                                			}





                                0x0041a54f
                                0x0041a557
                                0x0041a579
                                0x0041a57d

                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction ID: 60dc777ab2a5703fe93ec60752bbea5a413bae98553eb5929f98badcd8fbe991
                                • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction Fuzzy Hash: B2F015B2200208ABCB14DF89CC81EEB77ADEF8C754F158149BE0897241C630F811CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 163 41a490-41a4b9 call 41af60 NtClose
                                APIs
                                • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction ID: a008c5d5ec14fa9f5013d94ab86a46559dd82bf248144eb087863a0ac6a31d62
                                • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction Fuzzy Hash: F7D01776200218ABD710EB99CC85EE77BACEF48B64F158499BA1C9B242C530FA1086E0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 93%
                                			E00409AB0(intOrPtr* _a4) {
                                				intOrPtr _v8;
                                				char _v24;
                                				char _v284;
                                				char _v804;
                                				char _v840;
                                				void* _t24;
                                				void* _t31;
                                				void* _t33;
                                				void* _t34;
                                				void* _t39;
                                				void* _t50;
                                				intOrPtr* _t52;
                                				void* _t53;
                                				void* _t54;
                                				void* _t55;
                                				void* _t56;
                                
                                				_t52 = _a4;
                                				_t39 = 0; // executed
                                				_t24 = E00407EA0(_t52,  &_v24); // executed
                                				_t54 = _t53 + 8;
                                				if(_t24 != 0) {
                                					E004080B0( &_v24,  &_v840);
                                					_t55 = _t54 + 8;
                                					do {
                                						E0041BE10( &_v284, 0x104);
                                						E0041C480( &_v284,  &_v804);
                                						_t56 = _t55 + 0x10;
                                						_t50 = 0x4f;
                                						while(1) {
                                							_t31 = E00414DF0(E00414D90(_t52, _t50),  &_v284);
                                							_t56 = _t56 + 0x10;
                                							if(_t31 != 0) {
                                								break;
                                							}
                                							_t50 = _t50 + 1;
                                							if(_t50 <= 0x62) {
                                								continue;
                                							} else {
                                							}
                                							goto L8;
                                						}
                                						_t9 = _t52 + 0x14; // 0xffffe045
                                						 *(_t52 + 0x474) =  *(_t52 + 0x474) ^  *_t9;
                                						_t39 = 1;
                                						L8:
                                						_t33 = E004080E0( &_v24,  &_v840);
                                						_t55 = _t56 + 8;
                                					} while (_t33 != 0 && _t39 == 0);
                                					_t34 = E00408160(_t52,  &_v24); // executed
                                					if(_t39 == 0) {
                                						asm("rdtsc");
                                						asm("rdtsc");
                                						_v8 = _t34 - 0 + _t34;
                                						 *((intOrPtr*)(_t52 + 0x55c)) =  *((intOrPtr*)(_t52 + 0x55c)) + 0xffffffba;
                                					}
                                					 *((intOrPtr*)(_t52 + 0x31)) =  *((intOrPtr*)(_t52 + 0x31)) + _t39;
                                					_t20 = _t52 + 0x31; // 0x5608758b
                                					 *((intOrPtr*)(_t52 + 0x32)) =  *((intOrPtr*)(_t52 + 0x32)) +  *_t20 + 1;
                                					return 1;
                                				} else {
                                					return _t24;
                                				}
                                			}



















                                0x00409abb
                                0x00409ac3
                                0x00409ac5
                                0x00409aca
                                0x00409acf
                                0x00409ae2
                                0x00409ae7
                                0x00409af0
                                0x00409afc
                                0x00409b0f
                                0x00409b14
                                0x00409b17
                                0x00409b20
                                0x00409b32
                                0x00409b37
                                0x00409b3c
                                0x00000000
                                0x00000000
                                0x00409b3e
                                0x00409b42
                                0x00000000
                                0x00000000
                                0x00409b44
                                0x00000000
                                0x00409b42
                                0x00409b46
                                0x00409b49
                                0x00409b4f
                                0x00409b51
                                0x00409b5c
                                0x00409b61
                                0x00409b64
                                0x00409b71
                                0x00409b7c
                                0x00409b7e
                                0x00409b84
                                0x00409b88
                                0x00409b8b
                                0x00409b8b
                                0x00409b92
                                0x00409b95
                                0x00409b9a
                                0x00409ba7
                                0x00409ad6
                                0x00409ad6
                                0x00409ad6

                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ed878d8682106b50380cb3f7a3660dbe535b89e10b8b11201fef7fd01b0729b
                                • Instruction ID: 0b46cc9625fd597f0f1293e0fe630cc8c1f9f1e3f005c30533d49d025d22dd75
                                • Opcode Fuzzy Hash: 4ed878d8682106b50380cb3f7a3660dbe535b89e10b8b11201fef7fd01b0729b
                                • Instruction Fuzzy Hash: 97210AB2D4020857CB25D674AD52BFF73BCAB54314F04007FE949A3182F638BE498BA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID: 6EA
                                • API String ID: 3298025750-1400015478
                                • Opcode ID: 5304f99199cc5344202ee1135ec850f2f663834a0a9a72cbf6f89bf63bdf5892
                                • Instruction ID: 16a3f995337f8e2c4385bfad51fcf563527f35bc3975e45514ceebc0da5312a6
                                • Opcode Fuzzy Hash: 5304f99199cc5344202ee1135ec850f2f663834a0a9a72cbf6f89bf63bdf5892
                                • Instruction Fuzzy Hash: 9BF0A9B6200208AFDB24EF59DC40EEB33A9EF88714F19814AFD0C57302D631E920CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 10 41a630-41a661 call 41af60 RtlAllocateHeap
                                C-Code - Quality: 100%
                                			E0041A630(intOrPtr _a4, char _a8, long _a12, long _a16) {
                                				intOrPtr _t7;
                                				void* _t10;
                                				void* _t15;
                                
                                				_t7 = _a4;
                                				E0041AF60(_t15, _t7, _t7 + 0xc70,  *((intOrPtr*)(_t7 + 0x10)), 0, 0x34);
                                				_t6 =  &_a8; // 0x414536
                                				_t10 = RtlAllocateHeap( *_t6, _a12, _a16); // executed
                                				return _t10;
                                			}






                                0x0041a633
                                0x0041a647
                                0x0041a652
                                0x0041a65d
                                0x0041a661

                                APIs
                                • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A65D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: 6EA
                                • API String ID: 1279760036-1400015478
                                • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction ID: b63900df46c74d48569035b2bcc9be016157083d4ef88d1b541c797289a4eec1
                                • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction Fuzzy Hash: 46E012B1200208ABDB14EF99CC41EA777ACEF88664F158559BA085B242C630F9118AB0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14 41a5ba-41a647 call 41af60 17 41a64c-41a661 RtlAllocateHeap 14->17
                                C-Code - Quality: 100%
                                			E0041A5BA(void* __eax) {
                                				void* _t9;
                                				void* _t14;
                                				void* _t18;
                                
                                				E0041AF60(_t14, __eax, __eax + 0xc70,  *((intOrPtr*)(__eax + 0x10)), 0, 0x34);
                                				_t5 = _t18 + 0xc; // 0x414536
                                				_t9 = RtlAllocateHeap( *_t5,  *(_t18 + 0x10),  *(_t18 + 0x14)); // executed
                                				return _t9;
                                			}






                                0x0041a647
                                0x0041a652
                                0x0041a65d
                                0x0041a661

                                APIs
                                • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A65D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: 6EA
                                • API String ID: 1279760036-1400015478
                                • Opcode ID: 2669dedf1251c175eccc5353f27183fcd357daa357cf933456236a8698346c9b
                                • Instruction ID: b574a28a350e6e547d928f58f8d8b9a1961f9701064330b7c9d819fa567d54ef
                                • Opcode Fuzzy Hash: 2669dedf1251c175eccc5353f27183fcd357daa357cf933456236a8698346c9b
                                • Instruction Fuzzy Hash: 60E08CB1201204ABD724DF55CC40EE7336CEF88314F258549FA0D5B281C530E822CBB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 160 41a670-41a6a1 call 41af60 RtlFreeHeap
                                C-Code - Quality: 40%
                                			E0041A670(intOrPtr _a4, void* _a8, intOrPtr _a12, void* _a16) {
                                				intOrPtr _t9;
                                				char _t10;
                                				void* _t12;
                                				void* _t15;
                                
                                				_t3 = _a4 + 0xc74; // 0xc74
                                				E0041AF60(_t15, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x35);
                                				_t9 = _a12;
                                				_t12 = _a8;
                                				asm("les edx, [edx+edx*2]");
                                				_push(_t9);
                                				_t10 = RtlFreeHeap(_t12); // executed
                                				return _t10;
                                			}







                                0x0041a67f
                                0x0041a687
                                0x0041a68f
                                0x0041a692
                                0x0041a696
                                0x0041a69b
                                0x0041a69d
                                0x0041a6a1

                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction ID: 086aab0bc8c344d6c60c9bbd5a0512cabfd8005857d16272e4a7e29987098a06
                                • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction Fuzzy Hash: C1E012B1200208ABDB18EF99CC49EA777ACEF88764F118559BA085B242C630E9108AB0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 166 41a6a2-41a6a6 167 41a696-41a6a1 RtlFreeHeap 166->167 168 41a6a8-41a6af 166->168
                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: f542048db4494a127abcd3378f75cb9e90265658b028a8ff5dd88ae2c8890ad6
                                • Instruction ID: ab52722a6b549650ed21ff3eb1bfadcd270b911449a0399e56dca95450cfa4b4
                                • Opcode Fuzzy Hash: f542048db4494a127abcd3378f75cb9e90265658b028a8ff5dd88ae2c8890ad6
                                • Instruction Fuzzy Hash: E0C0C03520006206C110AF19EC204F36307FBC4310318C956C0C84E200CD328C128360
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 76%
                                			E00417D8F(void* __eax, void* __edi, void* __eflags, char _a4) {
                                				void* _v1;
                                				char _v5;
                                				short _v7;
                                				char _v8;
                                				char _v12;
                                				char _v13;
                                				short _v15;
                                				char _v19;
                                				char _v20;
                                				intOrPtr _v24;
                                				intOrPtr _v28;
                                				char _v91;
                                				char _v92;
                                				char _v155;
                                				char _v156;
                                				char _v260;
                                				char _v778;
                                				char _v780;
                                				char _t127;
                                				void* _t137;
                                				signed int _t142;
                                				intOrPtr _t157;
                                				intOrPtr _t200;
                                				char _t204;
                                				void* _t260;
                                				char _t264;
                                				intOrPtr _t265;
                                				void* _t269;
                                				void* _t274;
                                				void* _t275;
                                				void* _t278;
                                
                                				if(__eflags <= 0) {
                                					asm("sbb eax, 0x8b5502c0");
                                					_t269 = __eax;
                                					_t274 = __eax - 0x308;
                                					_v92 = 0;
                                					E0041BE60( &_v91, 0, 0x3f);
                                					_t275 = _t274 + 0xc;
                                					_v20 = 0;
                                					_v19 = 0;
                                					_v15 = 0;
                                					_v13 = 0;
                                					_t264 = 0;
                                					__eflags = 0;
                                					do {
                                						_t127 = E0040A480(__eflags, 0x4e, 0x8d);
                                						_t275 = _t275 + 8;
                                						_t204 = 0;
                                						__eflags = 0;
                                						while(1) {
                                							__eflags = _t127 -  *((intOrPtr*)(_t269 + _t204 - 0x10));
                                							if(_t127 ==  *((intOrPtr*)(_t269 + _t204 - 0x10))) {
                                								goto L9;
                                							}
                                							_t204 = _t204 + 1;
                                							__eflags = _t204 - _t264;
                                							if(_t204 <= _t264) {
                                								continue;
                                							} else {
                                								__eflags = _t127;
                                								if(_t127 != 0) {
                                									 *((char*)(_t269 + _t264 - 0x10)) = _t127;
                                									_t264 = _t264 + 1;
                                									__eflags = _t264;
                                								}
                                							}
                                							goto L9;
                                						}
                                						L9:
                                						__eflags = _t264 - 8;
                                					} while (__eflags < 0);
                                					_v12 = 0x2e777777;
                                					_v8 = 0;
                                					_v7 = 0;
                                					_v5 = 0;
                                					_v156 = 0;
                                					E0041BE60( &_v155, 0, 0x3f);
                                					_push(E0040A480(__eflags, 2, 5) & 0x000000ff);
                                					_push( &_v156);
                                					E0041C710();
                                					 *((char*)(_t269 + E0041C0B0( &_v156) - 0x98)) = 0x3d;
                                					_push(E0040A480(__eflags, 4, 0x10) & 0x000000ff);
                                					_push(_t269 + E0041C0B0( &_v156) - 0x98);
                                					_t137 = E0041C710();
                                					_t24 =  &_a4; // 0x2e777777
                                					_t265 =  *_t24;
                                					_t200 = 0;
                                					_t278 = _t275 + 0x34;
                                					_v24 = 0;
                                					_t260 = 0;
                                					do {
                                						__eflags =  *((intOrPtr*)(_t265 + 0x1168)) - _t200;
                                						if( *((intOrPtr*)(_t265 + 0x1168)) != _t200) {
                                							E0041BE10( &_v92, 0x2e);
                                							_v780 = 0;
                                							E0041BE60( &_v778, 0, 0x206);
                                							E0041BE10( *((intOrPtr*)(_t265 + 0x14a4)) + _t260, 0x388);
                                							_t142 = E0041C3D0();
                                							_t32 = _t200 - 1; // -1
                                							 *( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x40) = _t142 * _t32 & 0x00000001;
                                							E0041BDE0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x87,  &_v156, E0041C0B0( &_v156));
                                							_t40 =  &_v12; // 0x2e777777
                                							E0041BDE0( &_v92, _t40, 4);
                                							_push(4);
                                							E0040AFB0(_t200, _t265, __eflags, _t265, _t269 + E0041C0B0( &_v92) - 0x58,  *(_t269 + _t200 - 0x10) & 0x000000ff);
                                							E0041BDE0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260,  &_v92, E0041C0B0( &_v92));
                                							_t157 = E0041C0B0( &_v92);
                                							_t202 = _t265 + 0xe90;
                                							_v28 = _t157;
                                							E0041C1E0( &_v92, _t265 + 0xe90, 0);
                                							E00409E20( &_v260);
                                							E0040AB70( &_v260,  &_v92, E0041C0B0( &_v92));
                                							E0040AB40( &_v260);
                                							E0041BDE0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x72,  &_v260, 0x14);
                                							 *((char*)(_t269 + _v28 - 0x58)) = 0;
                                							 *((intOrPtr*)( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x4c)) = 2;
                                							 *((intOrPtr*)( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x50)) = 1;
                                							E0040B040(_t265 + 0xe90, _t265, __eflags, _t265,  &_v780, 0x41, 1);
                                							E0041C480( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0xc7,  &_v780);
                                							E0040B040(_t265 + 0xe90, _t265, __eflags, _t265,  &_v780, 0x42, 1);
                                							E0041C480(E0041C0B0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0xc7) +  *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0xc7,  &_v780);
                                							E0041C1E0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0xc7,  &_v92, 0);
                                							E0040B040(_t202, _t265, __eflags, _t265,  &_v780, 0x45, 1);
                                							E0041C480( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x167,  &_v780);
                                							E0040B040(_t202, _t265, __eflags, _t265,  &_v780, 0x46, 1);
                                							E0041C480(E0041C0B0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x167) +  *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x167,  &_v780);
                                							E0041C1E0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x167,  &_v92, 0);
                                							E0040B040(_t202, _t265, __eflags, _t265,  &_v780, 0x4a, 1);
                                							__eflags = E0041C0B0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x287) +  *((intOrPtr*)(_t265 + 0x14a4));
                                							E0041C480(E0041C0B0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x287) +  *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x287,  &_v780);
                                							E0041C1E0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x287,  &_v92, 0);
                                							_t137 = E0041C1E0( *((intOrPtr*)(_t265 + 0x14a4)) + _t260 + 0x287, _t202, 0);
                                							_t200 = _v24;
                                							_t278 = _t278 + 0x144;
                                						}
                                						_t200 = _t200 + 1;
                                						_t260 = _t260 + 0x388;
                                						_v24 = _t200;
                                						__eflags = _t260 - 0x1c40;
                                					} while (_t260 < 0x1c40);
                                					return _t137;
                                				} else {
                                					asm("lds ecx, [ebp+0x72f52c32]");
                                					_push(cs);
                                					asm("movsb");
                                					asm("lock cwde");
                                					asm("in eax, dx");
                                					_push(ds);
                                					asm("adc bl, [edi+ebx*8+0x646ada1]");
                                					asm("rcl byte [eax-0x2f36f9ca], 1");
                                					asm("adc [ebp-0xc457319], edi");
                                					asm("adc al, 0xe9");
                                					return 0x4c;
                                				}
                                			}


































                                0x00417d91
                                0x00417dcd
                                0x00417dd1
                                0x00417dd3
                                0x00417de4
                                0x00417de8
                                0x00417def
                                0x00417df2
                                0x00417df6
                                0x00417df9
                                0x00417dfd
                                0x00417e00
                                0x00417e00
                                0x00417e02
                                0x00417e09
                                0x00417e0e
                                0x00417e11
                                0x00417e11
                                0x00417e13
                                0x00417e13
                                0x00417e17
                                0x00000000
                                0x00000000
                                0x00417e19
                                0x00417e1a
                                0x00417e1c
                                0x00000000
                                0x00417e1e
                                0x00417e1e
                                0x00417e20
                                0x00417e22
                                0x00417e26
                                0x00417e26
                                0x00417e26
                                0x00417e20
                                0x00000000
                                0x00417e1c
                                0x00417e27
                                0x00417e27
                                0x00417e27
                                0x00417e38
                                0x00417e3f
                                0x00417e43
                                0x00417e47
                                0x00417e4a
                                0x00417e50
                                0x00417e61
                                0x00417e68
                                0x00417e69
                                0x00417e7e
                                0x00417e91
                                0x00417ea8
                                0x00417ea9
                                0x00417eae
                                0x00417eae
                                0x00417eb1
                                0x00417eb3
                                0x00417eb6
                                0x00417eb9
                                0x00417ec0
                                0x00417ec0
                                0x00417ec6
                                0x00417ed2
                                0x00417ee6
                                0x00417eed
                                0x00417f00
                                0x00417f05
                                0x00417f10
                                0x00417f19
                                0x00417f3f
                                0x00417f46
                                0x00417f4e
                                0x00417f5b
                                0x00417f70
                                0x00417f8c
                                0x00417f95
                                0x00417f9c
                                0x00417fa7
                                0x00417faa
                                0x00417fb6
                                0x00417fd0
                                0x00417fdf
                                0x00417ff8
                                0x00418006
                                0x00418015
                                0x00418025
                                0x0041802d
                                0x00418047
                                0x00418058
                                0x0041808b
                                0x004180a4
                                0x004180b5
                                0x004180cf
                                0x004180e0
                                0x00418113
                                0x0041812c
                                0x0041813d
                                0x0041815f
                                0x00418170
                                0x00418189
                                0x0041819f
                                0x004181a4
                                0x004181a7
                                0x004181a7
                                0x004181aa
                                0x004181ab
                                0x004181b1
                                0x004181b4
                                0x004181b4
                                0x004181c6
                                0x00417d93
                                0x00417d93
                                0x00417d9b
                                0x00417d9c
                                0x00417d9d
                                0x00417d9f
                                0x00417da3
                                0x00417da4
                                0x00417dab
                                0x00417db6
                                0x00417dbc
                                0x00417dc9
                                0x00417dc9

                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: =$www.$www.
                                • API String ID: 0-3343787489
                                • Opcode ID: 7be016d80460a8a1b76c5ff737973e5e2247fef4e2f4c5279ce1ea8d59ccfac8
                                • Instruction ID: ec73b18e1ea57a5636c2ceeac009c9ed2703a4033b3d15a9dd3f4c48b9a834bc
                                • Opcode Fuzzy Hash: 7be016d80460a8a1b76c5ff737973e5e2247fef4e2f4c5279ce1ea8d59ccfac8
                                • Instruction Fuzzy Hash: 97C1C3B1940248AACB15DBF0CC82FDFB77CAF44308F04455EF6195A182DB78A684CBA9
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aaa6185e4b204748f6d1111e3a0f947dd2afa9601ad001b4350346e597027778
                                • Instruction ID: aa74734cd191fc3582222480cab941632401a3c66f333bc62df168440cef8e3a
                                • Opcode Fuzzy Hash: aaa6185e4b204748f6d1111e3a0f947dd2afa9601ad001b4350346e597027778
                                • Instruction Fuzzy Hash: 96D0A923A0D61A0D66628C8AAE922B1E3A4F1C30B7BA867AF8587AB1028452D00D1189
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 46%
                                			E00407B1A(void* __eax, signed int __ebx, void* __ecx, void* __edx, void* __edi, intOrPtr* __esi) {
                                
                                				fs =  *__esi;
                                				asm("lds edx, [ebx+0x21]");
                                				_push(__edx);
                                				 *((intOrPtr*)(__edi - 0x68)) =  *((intOrPtr*)(__edi - 0x68)) - __edx;
                                				asm("lock push ss");
                                				 *(__ebx - 0x40) =  *(__ebx - 0x40) ^ __ebx;
                                				return 1;
                                			}



                                0x00407b1c
                                0x00407b1f
                                0x00407b22
                                0x00407b23
                                0x00407b26
                                0x00407b28
                                0x00407b3a

                                Memory Dump Source
                                • Source File: 00000005.00000002.281405264.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ace3b453c3df93af392c8adb35a80300f67efe43a2bfb11dc08004285853aa87
                                • Instruction ID: c9f2826bc6164dd03ba616d094df6bafc981e8ca9453f4a739f242ce79006d04
                                • Opcode Fuzzy Hash: ace3b453c3df93af392c8adb35a80300f67efe43a2bfb11dc08004285853aa87
                                • Instruction Fuzzy Hash: 4FD0A71551919006DF214F29A8911E2FF74DF47210F1012CBD88467106D152C001C345
                                Uniqueness

                                Uniqueness Score: -1.00%