Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Strictor.272734.30355.11938

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Strictor.272734.30355.11938 (renamed file extension from 11938 to exe)
Analysis ID:632534
MD5:f7b5a24637b27abfd5809a27997ea31d
SHA1:7230e7f3bcb4e57d73fedf3c0d85067e95761323
SHA256:ced900f9ec05901373c3ae09a06b3ef5ef958764f1fc551590b5f2a820f115a1
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["www.gulabmonga.com/gfge/"], "decoy": ["loopcoalition.com", "hd126.com", "elioguion.net", "defitrader.academy", "exactemi.com", "angeloacierno.com", "range4tis.com", "ilovekuduro.us", "mydealsstation.com", "jerichoprinting.com", "birdcafe605.com", "freemansrepublic.com", "driedplasma.com", "valuableconnect.com", "anthonyvid.xyz", "theydo.support", "devnetsecops.com", "cryptork.tech", "ufheur678.store", "lavenderspa586.com", "scandicinvestmentholding.com", "youenfangtex.com", "gratefulgrandmas.com", "ampersandtalent.net", "wippychick.com", "stamping.digital", "trixes.net", "popinticket.com", "ivyleaguereading.com", "killerinktnpasumo3.xyz", "greatyuwx.com", "royaltortoisecookieco.online", "quinten-and-sam.com", "mobile-sh.com", "reacjs.com", "hongbufang.net", "winemenuimports.com", "nashuatelegrpah.com", "nicorgaa.com", "outlanfd.com", "personalitideal.com", "mhhj666.com", "themethodcollective.com", "36536a.com", "bijit.xyz", "yoursinsoccer.net", "cryptoducks.club", "defuw.com", "kangley.net", "hacvm.com", "zhouyihong.top", "takut5.com", "kreditnekarticers.com", "koigo-wp.com", "52byhx.com", "phaghpanah.com", "apqlds.com", "karxsba2ix.xyz", "demasinfimo.quest", "unitytrstbnk.com", "panasonic-hcm.com", "27530amethystway.com", "idealftz.xyz", "conventionline.com"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x37a30:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x37dba:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x60850:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x60bda:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x88670:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x889fa:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x43acd:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x6c8ed:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x9470d:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x435b9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x6c3d9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x941f9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x43bcf:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x6c9ef:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x9480f:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x43d47:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x6cb67:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x94987:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x387d2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x615f2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x89412:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x45ef1:$sqlite3step: 68 34 1C 7B E1
    • 0x46004:$sqlite3step: 68 34 1C 7B E1
    • 0x6ed11:$sqlite3step: 68 34 1C 7B E1
    • 0x6ee24:$sqlite3step: 68 34 1C 7B E1
    • 0x96b31:$sqlite3step: 68 34 1C 7B E1
    • 0x96c44:$sqlite3step: 68 34 1C 7B E1
    • 0x45f20:$sqlite3text: 68 38 2A 90 C5
    • 0x46045:$sqlite3text: 68 38 2A 90 C5
    • 0x6ed40:$sqlite3text: 68 38 2A 90 C5
    • 0x6ee65:$sqlite3text: 68 38 2A 90 C5
    • 0x96b60:$sqlite3text: 68 38 2A 90 C5
    • 0x96c85:$sqlite3text: 68 38 2A 90 C5
    • 0x45f33:$sqlite3blob: 68 53 D8 7F 8C
    • 0x4605b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6ed53:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6ee7b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x96b73:$sqlite3blob: 68 53 D8 7F 8C
    • 0x96c9b:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
    • 0x5178f:$s1: file:///
    • 0x5169f:$s2: {11111-22222-10009-11112}
    • 0x5171f:$s3: {11111-22222-50001-00000}
    • 0x4eb41:$s4: get_Module
    • 0x4ef87:$s5: Reverse
    • 0x50fce:$s6: BlockCopy
    • 0x50e12:$s7: ReadByte
    • 0x517a1:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
    00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d97:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15cc9:$sqlite3step: 68 34 1C 7B E1
        • 0x15ddc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cf8:$sqlite3text: 68 38 2A 90 C5
        • 0x15e1d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d0b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e33:$sqlite3blob: 68 53 D8 7F 8C
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 31 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.gulabmonga.com/gfge/"], "decoy": ["loopcoalition.com", "hd126.com", "elioguion.net", "defitrader.academy", "exactemi.com", "angeloacierno.com", "range4tis.com", "ilovekuduro.us", "mydealsstation.com", "jerichoprinting.com", "birdcafe605.com", "freemansrepublic.com", "driedplasma.com", "valuableconnect.com", "anthonyvid.xyz", "theydo.support", "devnetsecops.com", "cryptork.tech", "ufheur678.store", "lavenderspa586.com", "scandicinvestmentholding.com", "youenfangtex.com", "gratefulgrandmas.com", "ampersandtalent.net", "wippychick.com", "stamping.digital", "trixes.net", "popinticket.com", "ivyleaguereading.com", "killerinktnpasumo3.xyz", "greatyuwx.com", "royaltortoisecookieco.online", "quinten-and-sam.com", "mobile-sh.com", "reacjs.com", "hongbufang.net", "winemenuimports.com", "nashuatelegrpah.com", "nicorgaa.com", "outlanfd.com", "personalitideal.com", "mhhj666.com", "themethodcollective.com", "36536a.com", "bijit.xyz", "yoursinsoccer.net", "cryptoducks.club", "defuw.com", "kangley.net", "hacvm.com", "zhouyihong.top", "takut5.com", "kreditnekarticers.com", "koigo-wp.com", "52byhx.com", "phaghpanah.com", "apqlds.com", "karxsba2ix.xyz", "demasinfimo.quest", "unitytrstbnk.com", "panasonic-hcm.com", "27530amethystway.com", "idealftz.xyz", "conventionline.com"]}
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeReversingLabs: Detection: 41%
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeAvira: detected
          Source: www.gulabmonga.com/gfge/Avira URL Cloud: Label: malware
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeJoe Sandbox ML: detected
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4x nop then pop edi4_2_0040C3D8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4x nop then pop edi4_2_00415652

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.gulabmonga.com/gfge/
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E7780_2_0132E778
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E7680_2_0132E768
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004010304_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041BA9D4_2_0041BA9D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041CB904_2_0041CB90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00408C6B4_2_00408C6B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00408C704_2_00408C70
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402D874_2_00402D87
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402D904_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402FB04_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004185D0 NtCreateFile,4_2_004185D0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00418680 NtReadFile,4_2_00418680
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00418700 NtClose,4_2_00418700
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004187B0 NtAllocateVirtualMemory,4_2_004187B0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004186FA NtClose,4_2_004186FA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004187AA NtAllocateVirtualMemory,4_2_004187AA
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.278113921.0000000000972000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000003.268214252.0000000003D53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279929044.0000000000F45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000000.272909693.00000000005B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.284160709.000000000126F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277427240.0000000000DA5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeReversingLabs: Detection: 41%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe:Zone.IdentifierJump to behavior
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Strictor.272734.30355.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMutant created: \Sessions\1\BaseNamedObjects\GQUPSYLANzmrKS
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.7.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.5.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.9.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.3.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E298 push 2402B6C3h; ret 0_2_0132E2A5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132F550 push eax; retf 0_2_0132F551
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132F5F2 pushfd ; retf 0_2_0132F5F5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B87C push eax; ret 4_2_0041B882
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B812 push eax; ret 4_2_0041B818
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B81B push eax; ret 4_2_0041B882
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040C8D2 push esp; iretd 4_2_0040C8DA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041C905 push dword ptr [DE3B1691h]; ret 4_2_0041C926
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041612A push 78D33A13h; iretd 4_2_004161E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004161B3 push 78D33A13h; iretd 4_2_004161E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040C2F8 push ds; retf 4_2_0040C328
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040D417 push 00000060h; iretd 4_2_0040D41D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041CDA5 push 073A5053h; ret 4_2_0041CDC5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00414E92 push esp; ret 4_2_00414EA1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00414EA2 push ds; retf 4_2_00414EA3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B7C5 push eax; ret 4_2_0041B818
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98237673455
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Strictor.272734.30355.exe PID: 4812, type: MEMORYSTR
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe TID: 3032Thread sleep time: -43731s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe TID: 1960Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004088C0 rdtsc 4_2_004088C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 43731Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004088C0 rdtsc 4_2_004088C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception111
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
          Software Packing
          NTDS112
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
          Process Injection
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe41%ReversingLabsByteCode-MSIL.Trojan.Strictor
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe100%AviraHEUR/AGEN.1221711
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.7.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.5.unpack100%AviraHEUR/AGEN.1221711Download File
          4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          0.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.9.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.2.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.3.unpack100%AviraHEUR/AGEN.1221711Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          www.gulabmonga.com/gfge/100%Avira URL Cloudmalware
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.gulabmonga.com/gfge/true
          • Avira URL Cloud: malware
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:632534
                              Start date and time: 23/05/202218:48:192022-05-23 18:48:19 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 17s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:SecuriteInfo.com.Variant.Strictor.272734.30355.11938 (renamed file extension from 11938 to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:25
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/1@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 36.8% (good quality ratio 35.4%)
                              • Quality average: 72.4%
                              • Quality standard deviation: 29.4%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 24
                              • Number of non-executed functions: 4
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • VT rate limit hit for: SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              TimeTypeDescription
                              18:49:37API Interceptor2x Sleep call for process: SecuriteInfo.com.Variant.Strictor.272734.30355.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.776603349690639
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              File size:697344
                              MD5:f7b5a24637b27abfd5809a27997ea31d
                              SHA1:7230e7f3bcb4e57d73fedf3c0d85067e95761323
                              SHA256:ced900f9ec05901373c3ae09a06b3ef5ef958764f1fc551590b5f2a820f115a1
                              SHA512:959325d256c0ff26adbc7efd074545e76a2b0a8da970d02eab085247a19d158ff3e640fa04b5ac03f1076dd81282a2b79d4ebeed67b50d52bf03ad516b11e731
                              SSDEEP:12288:ii+Y9LG4kiVo8Bg+fK6NQrFECIPHSzqCG4NuOMHUSQSLLXE9D:ijY9y+Zg+fK6qru6WCG4NuO1SQSLLID
                              TLSH:87E4F0E0E550D21BEDB68AB08035EA34A2755ED8A0F1E54E55D4B8A337F329F10B3C97
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H.b..............0..^...D.......}... ........@.. ....................................@................................
                              Icon Hash:614444494d55512b
                              Entrypoint:0x487dca
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x628B48F7 [Mon May 23 08:42:31 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x87d780x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x240c0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x85dd00x85e00False0.977972178455data7.98237673455IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x880000x240c00x24200False0.511657926038data6.11584329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xae0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x882200x468GLS_BINARY_LSB_FIRST
                              RT_ICON0x886880x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4278913803, next used block 4278914060
                              RT_ICON0x897300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4284900966, next used block 4291085508
                              RT_ICON0x8bcd80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294704123, next used block 4294901502
                              RT_ICON0x8ff000x10828data
                              RT_ICON0xa07280xb402PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                              RT_GROUP_ICON0xabb2c0x5adata
                              RT_VERSION0xabb880x34cdata
                              RT_MANIFEST0xabed40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2018
                              Assembly Version1.0.0.0
                              InternalNameCOMServerEn.exe
                              FileVersion1.0.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameCIS501FinalProject
                              ProductVersion1.0.0.0
                              FileDescriptionCIS501FinalProject
                              OriginalFilenameCOMServerEn.exe
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:18:49:27
                              Start date:23/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe"
                              Imagebase:0x970000
                              File size:697344 bytes
                              MD5 hash:F7B5A24637B27ABFD5809A27997EA31D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:4
                              Start time:18:49:41
                              Start date:23/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Imagebase:0x5b0000
                              File size:697344 bytes
                              MD5 hash:F7B5A24637B27ABFD5809A27997EA31D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low

                              Reset < >

                                Execution Graph

                                Execution Coverage:13.1%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:104
                                Total number of Limit Nodes:11
                                execution_graph 10033 132b890 GetCurrentProcess 10034 132b903 10033->10034 10035 132b90a GetCurrentThread 10033->10035 10034->10035 10036 132b940 10035->10036 10037 132b947 GetCurrentProcess 10035->10037 10036->10037 10038 132b97d 10037->10038 10039 132b9a5 GetCurrentThreadId 10038->10039 10040 132b9d6 10039->10040 10041 13240d0 10042 13240e2 10041->10042 10045 13240ee 10042->10045 10047 13241e0 10042->10047 10044 132410d 10052 1323868 10045->10052 10048 1324205 10047->10048 10056 13242e0 10048->10056 10060 13242d0 10048->10060 10053 1323873 10052->10053 10068 13258ac 10053->10068 10055 1326a64 10055->10044 10058 1324307 10056->10058 10057 13243e4 10057->10057 10058->10057 10064 13238a8 10058->10064 10062 1324307 10060->10062 10061 13243e4 10061->10061 10062->10061 10063 13238a8 CreateActCtxA 10062->10063 10063->10061 10065 1325370 CreateActCtxA 10064->10065 10067 1325433 10065->10067 10069 13258b7 10068->10069 10072 13258cc 10069->10072 10071 1326c55 10071->10055 10073 13258d7 10072->10073 10076 13258fc 10073->10076 10075 1326d3a 10075->10071 10077 1325907 10076->10077 10080 132592c 10077->10080 10079 1326e2a 10079->10075 10081 1325937 10080->10081 10082 13272e9 10081->10082 10089 1327588 10081->10089 10084 132753e 10082->10084 10094 13294b0 10082->10094 10098 13294a2 10082->10098 10083 132757c 10083->10079 10084->10083 10103 132b5b9 10084->10103 10090 1327541 10089->10090 10092 132758b 10089->10092 10091 132757c 10090->10091 10093 132b5b9 3 API calls 10090->10093 10091->10082 10092->10082 10093->10091 10108 13295a8 10094->10108 10115 1329598 10094->10115 10095 13294bf 10095->10084 10099 13294b0 10098->10099 10101 13295a8 2 API calls 10099->10101 10102 1329598 2 API calls 10099->10102 10100 13294bf 10100->10084 10101->10100 10102->10100 10104 132b5e9 10103->10104 10105 132b60d 10104->10105 10131 132b767 10104->10131 10135 132b778 10104->10135 10105->10083 10109 13295bb 10108->10109 10111 13295d3 10109->10111 10123 1329830 10109->10123 10110 13295cb 10110->10111 10112 13297d0 GetModuleHandleW 10110->10112 10111->10095 10113 13297fd 10112->10113 10113->10095 10116 13295a2 10115->10116 10117 1329533 10115->10117 10118 13295d3 10116->10118 10122 1329830 LoadLibraryExW 10116->10122 10117->10095 10118->10095 10119 13295cb 10119->10118 10120 13297d0 GetModuleHandleW 10119->10120 10121 13297fd 10120->10121 10121->10095 10122->10119 10124 1329844 10123->10124 10126 1329869 10124->10126 10127 1328920 10124->10127 10126->10110 10128 1329a10 LoadLibraryExW 10127->10128 10130 1329a89 10128->10130 10130->10126 10133 132b785 10131->10133 10132 132b7bf 10132->10105 10133->10132 10139 132a29c 10133->10139 10137 132b785 10135->10137 10136 132b7bf 10136->10105 10137->10136 10138 132a29c 3 API calls 10137->10138 10138->10136 10140 132a2a7 10139->10140 10142 132c4b8 10140->10142 10143 132bab4 10140->10143 10142->10142 10144 132babf 10143->10144 10145 132592c 3 API calls 10144->10145 10146 132c527 10144->10146 10145->10146 10150 132e2b0 10146->10150 10156 132e2aa 10146->10156 10147 132c560 10147->10142 10152 132e2e1 10150->10152 10153 132e32d 10150->10153 10151 132e2ed 10151->10147 10152->10151 10154 132e730 LoadLibraryExW GetModuleHandleW 10152->10154 10155 132e71f LoadLibraryExW GetModuleHandleW 10152->10155 10153->10147 10154->10153 10155->10153 10157 132e2b0 10156->10157 10158 132e2ed 10157->10158 10159 132e730 LoadLibraryExW GetModuleHandleW 10157->10159 10160 132e71f LoadLibraryExW GetModuleHandleW 10157->10160 10158->10147 10159->10158 10160->10158 10161 132bec0 DuplicateHandle 10162 132bf56 10161->10162

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0132B8F0
                                • GetCurrentThread.KERNEL32 ref: 0132B92D
                                • GetCurrentProcess.KERNEL32 ref: 0132B96A
                                • GetCurrentThreadId.KERNEL32 ref: 0132B9C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 759b0c7a8dc10c140614a1b3c47ff8cdb02fc4ed99371ede7834d441c5b2dcfb
                                • Instruction ID: a8a82bcc876477a5ec51e7c5c2824b62847dba16bfee7bc5d496726b614d4930
                                • Opcode Fuzzy Hash: 759b0c7a8dc10c140614a1b3c47ff8cdb02fc4ed99371ede7834d441c5b2dcfb
                                • Instruction Fuzzy Hash: 735163B4E006498FDB14DFA9C588BAEBBF1AF48308F208559E419B3394CB745944CB65
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 013297EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 19ad8fdf3606f076acb5710044e9ecda902cae335f3fa70c1806b0a6ac64b079
                                • Instruction ID: 0878e59ff60b14e72aeafcea838e209e867b4f858e7489ccb9b277c545dc94cb
                                • Opcode Fuzzy Hash: 19ad8fdf3606f076acb5710044e9ecda902cae335f3fa70c1806b0a6ac64b079
                                • Instruction Fuzzy Hash: 1A711670A00B258FD724EF69D44079ABBF1FF88218F108A2DD59AD7A40DB75E845CF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 73 1325364-132536c 74 1325370-1325431 CreateActCtxA 73->74 76 1325433-1325439 74->76 77 132543a-1325494 74->77 76->77 84 13254a3-13254a7 77->84 85 1325496-1325499 77->85 86 13254b8 84->86 87 13254a9-13254b5 84->87 85->84 89 13254b9 86->89 87->86 89->89
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 01325421
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: c594dd203e036e6dea168df5943788a217eb8b2ad63134ca4fcb07da409561bc
                                • Instruction ID: affb64cbd7577452e906f1d4da7e42a189a090c53bd189628876b1704b1e258e
                                • Opcode Fuzzy Hash: c594dd203e036e6dea168df5943788a217eb8b2ad63134ca4fcb07da409561bc
                                • Instruction Fuzzy Hash: C641F1B1D0422C8BDB24DFA9C844BCEFBB5BF48308F20846AD408BB251DB756946CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 90 13238a8-1325431 CreateActCtxA 93 1325433-1325439 90->93 94 132543a-1325494 90->94 93->94 101 13254a3-13254a7 94->101 102 1325496-1325499 94->102 103 13254b8 101->103 104 13254a9-13254b5 101->104 102->101 106 13254b9 103->106 104->103 106->106
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 01325421
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 68771ad1808033346139cf6f63657f125f089cab15e55f70d246acb0af53d365
                                • Instruction ID: 00847a9f9268baba1a3c897848ea39213b36b8554706baf6028927fec0c34368
                                • Opcode Fuzzy Hash: 68771ad1808033346139cf6f63657f125f089cab15e55f70d246acb0af53d365
                                • Instruction Fuzzy Hash: 1341E1B0D0422CCBDB24DFA9C8847DEBBB5BF48308F20856AD508BB251DB756945CF90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 107 132bec0-132bf54 DuplicateHandle 108 132bf56-132bf5c 107->108 109 132bf5d-132bf7a 107->109 108->109
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0132BF47
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: a2249f3c51200432be3f09c1659abcb0905e0c2f300da57ca0915aad09ada060
                                • Instruction ID: 18b3ffb8a76f32ab464795de610b44582b521cab7eee5c94411767028318379d
                                • Opcode Fuzzy Hash: a2249f3c51200432be3f09c1659abcb0905e0c2f300da57ca0915aad09ada060
                                • Instruction Fuzzy Hash: 7821C4B5900259AFDB10CF9AD484ADEFBF5FB48324F14841AE914A7350D774A944CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 112 1328920-1329a50 114 1329a52-1329a55 112->114 115 1329a58-1329a87 LoadLibraryExW 112->115 114->115 116 1329a90-1329aad 115->116 117 1329a89-1329a8f 115->117 117->116
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01329869,00000800,00000000,00000000), ref: 01329A7A
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 02f2ed6cc3bd30091c341a0bd60b9ee622366900a2645c45145da515ccef9ab3
                                • Instruction ID: 5f1a5e36c83f61307d0a9a40919a92ada6b8ef9a023a73e82bde563551fc3cd1
                                • Opcode Fuzzy Hash: 02f2ed6cc3bd30091c341a0bd60b9ee622366900a2645c45145da515ccef9ab3
                                • Instruction Fuzzy Hash: 061103B6D003599FEF10DF9AC444BDEBBF4AB88328F00842AE519B7200C7B4A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 120 1329788-13297c8 121 13297d0-13297fb GetModuleHandleW 120->121 122 13297ca-13297cd 120->122 123 1329804-1329818 121->123 124 13297fd-1329803 121->124 122->121 124->123
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 013297EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: a25f8052cf58b5fb1e2a8ee89936aee0fc8216deef0d40387a59327d18d2b451
                                • Instruction ID: 408c059ad9dad3d0290cbdb4b097c9451383b925c87bfa481bde85c6f75b9f88
                                • Opcode Fuzzy Hash: a25f8052cf58b5fb1e2a8ee89936aee0fc8216deef0d40387a59327d18d2b451
                                • Instruction Fuzzy Hash: 4411E3B5C007598FDB10DF9AC444BDEFBF5AB88328F14841AD919B7600D7B4A545CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278483029.00000000012CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12cd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7d4f6780d7a96208c5b09758f54fb530760feb0aac9d1faa31f07028891cc3ca
                                • Instruction ID: 9c90d617bab69a3d959453359f4fca79aa658dc9776c88160d05afe83633da6b
                                • Opcode Fuzzy Hash: 7d4f6780d7a96208c5b09758f54fb530760feb0aac9d1faa31f07028891cc3ca
                                • Instruction Fuzzy Hash: 7A2136B1514248EFCB11DF54E8C0B2ABF61FB94B58F20867DEB050B246C336D446CAE1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278546629.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12dd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ea0eca18842b33c789426ed4b991052347560d9b03378ebc9a1bb44d9ae3f507
                                • Instruction ID: 49ba2b15e50be60ff142856a9c25095767fc813825dd3d458bf1886fd5f1cdb9
                                • Opcode Fuzzy Hash: ea0eca18842b33c789426ed4b991052347560d9b03378ebc9a1bb44d9ae3f507
                                • Instruction Fuzzy Hash: 8B2164B0518A48EFCB10CF64D8C0B26BB61FBC8355F20C96DEA094B286C377D807CA61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278546629.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12dd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a24fd50383186193a685b5fd8fbe3ecba0a86fa785005918ac4b827b368320ea
                                • Instruction ID: b5c1b8c3f311f1e10365c26b83aff26ecd8b267ec18b6f8a642800d66f816832
                                • Opcode Fuzzy Hash: a24fd50383186193a685b5fd8fbe3ecba0a86fa785005918ac4b827b368320ea
                                • Instruction Fuzzy Hash: 092149B1518A48EFDB01CFA4C9C4B26BB65FB84324F20C56DE9094B287C376D846CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278546629.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12dd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e51f944d57d15f778e304f61d0591b5f3ae01e56f9f4cbcdc5c0aa26f53fff66
                                • Instruction ID: e97d301d675efa1b9cf198484e8a4c71b9669e429972efc37c8cc2acf2d986b5
                                • Opcode Fuzzy Hash: e51f944d57d15f778e304f61d0591b5f3ae01e56f9f4cbcdc5c0aa26f53fff66
                                • Instruction Fuzzy Hash: 7421D1754087849FCB03CF24C990B11BF71EB86314F28C5EAD9488B697C33AD84ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278483029.00000000012CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12cd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3d3a5c8a77c1f93a9d2bb5ebde4aa2dc7ff225c0119cd3fdbf9822ffe318854
                                • Instruction ID: badadbfbcdc19d369e1074891e45b9b33d799d5fe1e7ae5d5ff2add165a0c9fb
                                • Opcode Fuzzy Hash: d3d3a5c8a77c1f93a9d2bb5ebde4aa2dc7ff225c0119cd3fdbf9822ffe318854
                                • Instruction Fuzzy Hash: 9F11E176404284DFCB12CF14E9C4B16BF72FB84724F24C6ADDA440B656C336D45ACBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278546629.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12dd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 824b1736f384bdc6cd6c50cf4b2c9d41c7c828cab6d25fe1576c05bac77cb3fe
                                • Instruction ID: d66078833a8dce94de0914eea1aff5633d20c58f967a0a3a4c6590080cdde27a
                                • Opcode Fuzzy Hash: 824b1736f384bdc6cd6c50cf4b2c9d41c7c828cab6d25fe1576c05bac77cb3fe
                                • Instruction Fuzzy Hash: 4711BB75904684DFDB02CF54C5C8B15BBB2FB84224F28C6ADD9494B697C33AD44ACB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278483029.00000000012CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12cd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e3d3f82f3297492ffa72a5972ee3a6a24ac82a4568db2d59807759e42a8c02b4
                                • Instruction ID: 37262f7b29f513516937d4628735f0396e201cb3c470010a83066b68fcf20326
                                • Opcode Fuzzy Hash: e3d3f82f3297492ffa72a5972ee3a6a24ac82a4568db2d59807759e42a8c02b4
                                • Instruction Fuzzy Hash: 2C01F7710183889EE7105E55EC84766BFD8EF41A38F28852EEF4C5B247C7B99844CAF1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278483029.00000000012CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_12cd000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b5fe1ffe0e70c18ae299e039302fddf9905a9f5af334bb072e285194ab540e13
                                • Instruction ID: 5a701ec3ae60795fb12cff5111bca63d79a998d1e3fc1171e3944edc202c58bb
                                • Opcode Fuzzy Hash: b5fe1ffe0e70c18ae299e039302fddf9905a9f5af334bb072e285194ab540e13
                                • Instruction Fuzzy Hash: 41F068714042889FE7118A19DCC4B62FFD8DB41734F18C55EEF485F286C3785844CAB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aff9fe35d69f70dc9ca81266a6f0864a3d6dfeb7a643fed029908c88cf025484
                                • Instruction ID: b840acf11d135577b32180d8affe47356438df5174cf66247ee2396848c04ec3
                                • Opcode Fuzzy Hash: aff9fe35d69f70dc9ca81266a6f0864a3d6dfeb7a643fed029908c88cf025484
                                • Instruction Fuzzy Hash: EF12B4F9C91F468BD720CF65E8C82893BE1B7613A8BD04A0AD2711BAD1D7B4116ECF45
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.278630616.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1320000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a52aafa156b105474ff6d76e0a66293020f5ab99c5422a3502febe4fa891b225
                                • Instruction ID: 8c65ce0cdb82002e210c573449f84fd4673acc59d2c8420ab6d06256d03a7ab1
                                • Opcode Fuzzy Hash: a52aafa156b105474ff6d76e0a66293020f5ab99c5422a3502febe4fa891b225
                                • Instruction Fuzzy Hash: 05C12BB9C91B458BD720CF64E8C82893BE1BB653A8F914B0AD2612B6D1D7B4146ECF44
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Execution Graph

                                Execution Coverage:3.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:4%
                                Total number of Nodes:323
                                Total number of Limit Nodes:35
                                execution_graph 14389 41d420 14390 41d42b 14389->14390 14392 419be0 14389->14392 14393 419c06 14392->14393 14400 408b50 14393->14400 14395 419c12 14399 419c4b 14395->14399 14406 40d160 14395->14406 14397 419c27 14416 40a600 14397->14416 14399->14390 14430 408aa0 14400->14430 14402 408b64 14402->14395 14403 408b5d 14403->14402 14437 40cf60 14403->14437 14407 40d18c 14406->14407 14679 40d070 14407->14679 14410 40d1d1 14413 40d1e2 14410->14413 14415 418700 NtClose 14410->14415 14411 40d1b9 14412 40d1c4 14411->14412 14414 418700 NtClose 14411->14414 14412->14397 14413->14397 14414->14412 14415->14413 14417 40a625 14416->14417 14429 40a885 14417->14429 14683 4079d0 14417->14683 14419 40a788 14420 41a090 RtlFreeHeap 14419->14420 14422 40a795 14420->14422 14421 40a72b 14421->14419 14423 40a7d2 14421->14423 14426 40a7e2 14421->14426 14421->14429 14422->14399 14424 41a090 RtlFreeHeap 14423->14424 14425 40a7d9 14424->14425 14425->14399 14426->14419 14427 40a861 14426->14427 14428 41a090 RtlFreeHeap 14427->14428 14428->14429 14429->14399 14431 408ab3 14430->14431 14432 408ac6 14431->14432 14441 419520 14431->14441 14432->14403 14434 408b03 14434->14432 14450 4088c0 14434->14450 14436 408b23 14436->14403 14439 40cf79 14437->14439 14438 408b75 14438->14395 14439->14438 14440 418700 NtClose 14439->14440 14440->14438 14442 419539 14441->14442 14453 413a40 14442->14453 14444 419551 14445 41955a 14444->14445 14482 419360 14444->14482 14445->14434 14448 41956e 14448->14445 14448->14448 14494 41a090 14448->14494 14672 406e20 14450->14672 14452 4088da 14452->14436 14454 413a54 14453->14454 14456 413b63 14453->14456 14454->14456 14497 4185d0 14454->14497 14456->14444 14457 413ba7 14458 41a090 RtlFreeHeap 14457->14458 14460 413bb3 14458->14460 14459 413d39 14462 418700 NtClose 14459->14462 14460->14456 14460->14459 14461 413d4f 14460->14461 14466 413c42 14460->14466 14555 413780 14461->14555 14463 413d40 14462->14463 14463->14444 14465 413d62 14465->14444 14467 413ca9 14466->14467 14468 413c51 14466->14468 14467->14459 14474 413cbc 14467->14474 14469 413c56 14468->14469 14470 413c6a 14468->14470 14542 413640 14469->14542 14472 413c87 14470->14472 14473 413c6f 14470->14473 14472->14463 14510 413400 14472->14510 14500 4136e0 14473->14500 14552 418700 14474->14552 14475 413c60 14475->14444 14477 413c7d 14477->14444 14479 413c9f 14479->14444 14481 413d28 14481->14444 14483 419371 14482->14483 14484 419383 14483->14484 14601 41a010 14483->14601 14484->14448 14486 4193a4 14604 413050 14486->14604 14488 4193f0 14488->14448 14489 4193c7 14489->14488 14490 413050 2 API calls 14489->14490 14491 4193e9 14490->14491 14491->14488 14636 414380 14491->14636 14493 41947a 14493->14448 14493->14493 14669 4188e0 14494->14669 14496 4195c9 14496->14434 14582 4191d0 14497->14582 14499 4185ec NtCreateFile 14499->14457 14501 4136fc 14500->14501 14502 413724 14501->14502 14503 413738 14501->14503 14504 418700 NtClose 14502->14504 14505 418700 NtClose 14503->14505 14507 41372d 14504->14507 14506 413741 14505->14506 14584 41a2a0 14506->14584 14507->14477 14509 41374c 14509->14477 14511 41344b 14510->14511 14512 41347e 14510->14512 14514 418700 NtClose 14511->14514 14513 41349a 14512->14513 14516 4135c9 14512->14516 14517 4134d1 14513->14517 14518 4134bc 14513->14518 14515 41346f 14514->14515 14515->14479 14522 418700 NtClose 14516->14522 14520 4134d6 14517->14520 14521 4134ec 14517->14521 14519 418700 NtClose 14518->14519 14523 4134c5 14519->14523 14524 418700 NtClose 14520->14524 14529 4134f1 14521->14529 14590 41a260 14521->14590 14525 413629 14522->14525 14523->14479 14526 4134df 14524->14526 14525->14479 14526->14479 14531 413503 14529->14531 14593 418680 14529->14593 14530 413557 14532 413575 14530->14532 14533 41358a 14530->14533 14531->14479 14535 418700 NtClose 14532->14535 14534 418700 NtClose 14533->14534 14536 413593 14534->14536 14535->14531 14537 4135bf 14536->14537 14596 419e60 14536->14596 14537->14479 14539 4135aa 14540 41a090 RtlFreeHeap 14539->14540 14541 4135b3 14540->14541 14541->14479 14543 41367d 14542->14543 14544 413684 14543->14544 14545 413698 14543->14545 14546 418700 NtClose 14544->14546 14548 418700 NtClose 14545->14548 14547 41368d 14546->14547 14547->14475 14549 4136c2 14548->14549 14550 418700 NtClose 14549->14550 14551 4136cc 14550->14551 14551->14475 14553 41871c NtClose 14552->14553 14554 4191d0 14552->14554 14553->14481 14554->14553 14556 4137be 14555->14556 14557 4137c7 14556->14557 14558 4137dc 14556->14558 14559 418700 NtClose 14557->14559 14560 413800 14558->14560 14561 41384a 14558->14561 14571 4137d0 14559->14571 14565 418700 NtClose 14560->14565 14562 413890 14561->14562 14563 41384f 14561->14563 14564 4138a2 14562->14564 14569 4139ca 14562->14569 14566 418680 NtReadFile 14563->14566 14563->14571 14567 4138a7 14564->14567 14574 4138e2 14564->14574 14565->14571 14568 41387a 14566->14568 14575 418700 NtClose 14567->14575 14570 418700 NtClose 14568->14570 14569->14571 14573 418680 NtReadFile 14569->14573 14572 413883 14570->14572 14571->14465 14572->14465 14576 413a21 14573->14576 14574->14571 14579 418700 NtClose 14574->14579 14577 4138d3 14575->14577 14578 418700 NtClose 14576->14578 14577->14465 14580 413a2a 14578->14580 14581 413915 14579->14581 14580->14465 14581->14465 14583 4191e0 14582->14583 14583->14499 14587 4188a0 14584->14587 14586 41a2ba 14586->14509 14588 4191d0 14587->14588 14589 4188bc RtlAllocateHeap 14588->14589 14589->14586 14591 4188a0 RtlAllocateHeap 14590->14591 14592 41a278 14591->14592 14592->14529 14594 4191d0 14593->14594 14595 41869c NtReadFile 14594->14595 14595->14530 14597 419e84 14596->14597 14598 419e6d 14596->14598 14597->14539 14598->14597 14599 41a260 RtlAllocateHeap 14598->14599 14600 419e9b 14599->14600 14600->14539 14602 41a03d 14601->14602 14646 4187b0 14601->14646 14602->14486 14605 413061 14604->14605 14607 413069 14604->14607 14605->14489 14606 41333c 14606->14489 14607->14606 14649 41b240 14607->14649 14609 4130bd 14610 41b240 RtlAllocateHeap 14609->14610 14613 4130c8 14610->14613 14611 413116 14614 41b240 RtlAllocateHeap 14611->14614 14613->14611 14615 41b370 2 API calls 14613->14615 14660 41b2e0 14613->14660 14617 41312a 14614->14617 14615->14613 14616 413187 14618 41b240 RtlAllocateHeap 14616->14618 14617->14616 14654 41b370 14617->14654 14619 41319d 14618->14619 14621 4131da 14619->14621 14623 41b370 2 API calls 14619->14623 14622 41b240 RtlAllocateHeap 14621->14622 14624 4131e5 14622->14624 14623->14619 14625 41b370 2 API calls 14624->14625 14631 41321f 14624->14631 14625->14624 14628 41b2a0 RtlFreeHeap 14629 41331e 14628->14629 14630 41b2a0 RtlFreeHeap 14629->14630 14632 413328 14630->14632 14666 41b2a0 14631->14666 14633 41b2a0 RtlFreeHeap 14632->14633 14634 413332 14633->14634 14635 41b2a0 RtlFreeHeap 14634->14635 14635->14606 14637 414391 14636->14637 14638 413a40 5 API calls 14637->14638 14640 4143a7 14638->14640 14639 4143fa 14639->14493 14640->14639 14641 4143e2 14640->14641 14642 4143f5 14640->14642 14644 41a090 RtlFreeHeap 14641->14644 14643 41a090 RtlFreeHeap 14642->14643 14643->14639 14645 4143e7 14644->14645 14645->14493 14647 4187cc NtAllocateVirtualMemory 14646->14647 14648 4191d0 14646->14648 14647->14602 14648->14647 14650 41b250 14649->14650 14651 41b256 14649->14651 14650->14609 14652 41a260 RtlAllocateHeap 14651->14652 14653 41b27c 14652->14653 14653->14609 14655 41b2e0 14654->14655 14656 41a260 RtlAllocateHeap 14655->14656 14657 41b33d 14655->14657 14658 41b31a 14656->14658 14657->14617 14659 41a090 RtlFreeHeap 14658->14659 14659->14657 14661 41b305 14660->14661 14662 41b33d 14660->14662 14663 41a260 RtlAllocateHeap 14661->14663 14662->14613 14664 41b31a 14663->14664 14665 41a090 RtlFreeHeap 14664->14665 14665->14662 14667 413314 14666->14667 14668 41a090 RtlFreeHeap 14666->14668 14667->14628 14668->14667 14670 4191d0 14669->14670 14671 4188fc RtlFreeHeap 14670->14671 14671->14496 14673 406e30 14672->14673 14674 406e2b 14672->14674 14675 41a010 NtAllocateVirtualMemory 14673->14675 14674->14452 14676 406e55 14675->14676 14677 406eb8 14676->14677 14678 41a010 NtAllocateVirtualMemory 14676->14678 14677->14452 14678->14676 14680 40d08a 14679->14680 14682 40d140 14679->14682 14681 418700 NtClose 14680->14681 14681->14682 14682->14410 14682->14411 14684 4079e9 14683->14684 14690 407710 14683->14690 14686 407710 6 API calls 14684->14686 14689 407a0d 14684->14689 14687 4079fa 14686->14687 14687->14689 14699 40d460 14687->14699 14689->14421 14691 406e20 NtAllocateVirtualMemory 14690->14691 14697 40772a 14690->14697 14691->14697 14692 4079af 14692->14684 14694 418700 NtClose 14694->14697 14696 40a900 NtClose 14696->14697 14697->14692 14697->14694 14697->14696 14706 407540 14697->14706 14714 40d340 14697->14714 14718 407310 14697->14718 14700 40d485 14699->14700 14701 407120 5 API calls 14700->14701 14704 40d4a9 14701->14704 14702 40d4b6 14702->14689 14703 413a40 5 API calls 14703->14704 14704->14702 14704->14703 14705 41a090 RtlFreeHeap 14704->14705 14705->14704 14707 407556 14706->14707 14725 417af0 14707->14725 14709 40756f 14713 407683 14709->14713 14744 407120 14709->14744 14711 407655 14712 407310 5 API calls 14711->14712 14711->14713 14712->14713 14713->14697 14715 40d384 14714->14715 14716 40d3a5 14715->14716 14717 418700 NtClose 14715->14717 14716->14697 14717->14716 14721 407339 14718->14721 14719 4073d7 14719->14697 14720 418700 NtClose 14722 40740a 14720->14722 14721->14719 14721->14720 14722->14719 14723 413a40 5 API calls 14722->14723 14724 407528 14723->14724 14724->14697 14726 41a260 RtlAllocateHeap 14725->14726 14727 417b07 14726->14727 14751 408160 14727->14751 14729 417b22 14730 417b60 14729->14730 14731 417b49 14729->14731 14734 41a010 NtAllocateVirtualMemory 14730->14734 14732 41a090 RtlFreeHeap 14731->14732 14733 417b56 14732->14733 14733->14709 14735 417b9a 14734->14735 14736 41a010 NtAllocateVirtualMemory 14735->14736 14737 417bb3 14736->14737 14738 417e40 14737->14738 14741 417e54 14737->14741 14739 41a090 RtlFreeHeap 14738->14739 14740 417e4a 14739->14740 14740->14709 14742 41a090 RtlFreeHeap 14741->14742 14743 417ea9 14742->14743 14743->14709 14745 40721f 14744->14745 14746 407135 14744->14746 14745->14711 14746->14745 14747 413a40 5 API calls 14746->14747 14748 4071a2 14747->14748 14749 41a090 RtlFreeHeap 14748->14749 14750 4071c9 14748->14750 14749->14750 14750->14711 14752 408185 14751->14752 14753 4081dd 14752->14753 14755 40b330 14752->14755 14753->14729 14757 40b35c 14755->14757 14756 40b37c 14756->14753 14757->14756 14758 418700 NtClose 14757->14758 14759 40b3da 14758->14759 14759->14753

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 418680-4186c9 call 4191d0 NtReadFile
                                C-Code - Quality: 37%
                                			E00418680(intOrPtr _a4, char _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, char _a32, intOrPtr _a36, char _a40) {
                                				void* _t18;
                                				void* _t27;
                                				intOrPtr* _t28;
                                
                                				_t13 = _a4;
                                				_t28 = _a4 + 0xc48;
                                				E004191D0(_t27, _t13, _t28,  *((intOrPtr*)(_t13 + 0x10)), 0, 0x2a);
                                				_t4 =  &_a40; // 0x413a21
                                				_t6 =  &_a32; // 0x413d62
                                				_t12 =  &_a8; // 0x413d62
                                				_t18 =  *((intOrPtr*)( *_t28))( *_t12, _a12, _a16, _a20, _a24, _a28,  *_t6, _a36,  *_t4); // executed
                                				return _t18;
                                			}






                                0x00418683
                                0x0041868f
                                0x00418697
                                0x0041869c
                                0x004186a2
                                0x004186bd
                                0x004186c5
                                0x004186c9

                                APIs
                                • NtReadFile.NTDLL(b=A,5E972F65,FFFFFFFF,?,?,?,b=A,?,!:A,FFFFFFFF,5E972F65,00413D62,?,00000000), ref: 004186C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileRead
                                • String ID: !:A$b=A$b=A
                                • API String ID: 2738559852-704622139
                                • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction ID: 874bcf4b7b7dc579eb38d677a367109795b50ef5d252fa6d0d10ea1312fea5a1
                                • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                • Instruction Fuzzy Hash: E3F0A4B2200208ABDB18DF89DC95EEB77ADAF8C754F158249BE1D97241D630E851CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 94 4185d0-418621 call 4191d0 NtCreateFile
                                C-Code - Quality: 100%
                                			E004185D0(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                				long _t21;
                                				void* _t31;
                                
                                				_t3 = _a4 + 0xc40; // 0xc40
                                				E004191D0(_t31, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x28);
                                				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                				return _t21;
                                			}





                                0x004185df
                                0x004185e7
                                0x0041861d
                                0x00418621

                                APIs
                                • NtCreateFile.NTDLL(00000060,00408B03,?,00413BA7,00408B03,FFFFFFFF,?,?,FFFFFFFF,00408B03,00413BA7,?,00408B03,00000060,00000000,00000000), ref: 0041861D
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction ID: 94ce09d36334706186cc09884e4a2eaa092baa2fe979bd9646a6b1291086e505
                                • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                • Instruction Fuzzy Hash: B0F0BDB2200208ABCB08CF89DC95EEB77EDAF8C754F158248FA0D97241C630E851CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 97 4187aa-4187ed call 4191d0 NtAllocateVirtualMemory
                                C-Code - Quality: 64%
                                			E004187AA(void* __edx, intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                				void* _v117;
                                				long _t15;
                                				void* _t25;
                                
                                				asm("daa");
                                				asm("in eax, dx");
                                				_t11 = _a4;
                                				_t4 = _t11 + 0xc60; // 0xca0
                                				E004191D0(_t25, _a4, _t4,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x30);
                                				_t15 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                				return _t15;
                                			}






                                0x004187ad
                                0x004187ae
                                0x004187b3
                                0x004187bf
                                0x004187c7
                                0x004187e9
                                0x004187ed

                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,004193A4,?,00000000,?,00003000,00000040,00000000,00000000,00408B03), ref: 004187E9
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: b192ee78a2a19018707dab8068e69256a8e0ef565d56944463bca007bb55855a
                                • Instruction ID: b481fdb0ced22d0f0280b4c0c4f73a85521607a05db72164c6dbcdfdf2fe1efe
                                • Opcode Fuzzy Hash: b192ee78a2a19018707dab8068e69256a8e0ef565d56944463bca007bb55855a
                                • Instruction Fuzzy Hash: FFF05E71200118AFDB14DF99CC91EEB77ADEF88354F148219FD189B291C630E811CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 100 4187b0-4187c6 101 4187cc-4187ed NtAllocateVirtualMemory 100->101 102 4187c7 call 4191d0 100->102 102->101
                                C-Code - Quality: 100%
                                			E004187B0(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                				long _t14;
                                				void* _t21;
                                
                                				_t3 = _a4 + 0xc60; // 0xca0
                                				E004191D0(_t21, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x30);
                                				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                				return _t14;
                                			}





                                0x004187bf
                                0x004187c7
                                0x004187e9
                                0x004187ed

                                APIs
                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,004193A4,?,00000000,?,00003000,00000040,00000000,00000000,00408B03), ref: 004187E9
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction ID: 71e408db6ffae62f38499a7299b3f2ec9839ba1f647d0a7234910b9a40a1f481
                                • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                • Instruction Fuzzy Hash: 07F015B2200208ABDB18DF89CC85EEB77ADAF88754F158149FE0897241C630F810CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 106 4186fa-418729 call 4191d0 NtClose
                                C-Code - Quality: 100%
                                			E004186FA(intOrPtr _a4, void* _a8) {
                                				long _t9;
                                				void* _t13;
                                
                                				_t6 = _a4;
                                				_t2 = _t6 + 0x10; // 0x300
                                				_t3 = _t6 + 0xc50; // 0x409753
                                				E004191D0(_t13, _a4, _t3,  *_t2, 0, 0x2c);
                                				_t9 = NtClose(_a8); // executed
                                				return _t9;
                                			}





                                0x00418703
                                0x00418706
                                0x0041870f
                                0x00418717
                                0x00418725
                                0x00418729

                                APIs
                                • NtClose.NTDLL(00413D40,?,?,00413D40,00408B03,FFFFFFFF), ref: 00418725
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: 8c188e84467036fdc25452061c64e8bf377159e1ea27a2395850ea03acb310f8
                                • Instruction ID: 299ac74be8a787466458dd7873c677ac47eca5b3783d9a43cd6ee95d083ddca2
                                • Opcode Fuzzy Hash: 8c188e84467036fdc25452061c64e8bf377159e1ea27a2395850ea03acb310f8
                                • Instruction Fuzzy Hash: 18E0C27A2002047BD710EB94CC49FD77B68EF44764F144459FA1C9B342C570EA01CBE0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 109 418700-418716 110 41871c-418729 NtClose 109->110 111 418717 call 4191d0 109->111 111->110
                                C-Code - Quality: 100%
                                			E00418700(intOrPtr _a4, void* _a8) {
                                				long _t8;
                                				void* _t11;
                                
                                				_t5 = _a4;
                                				_t2 = _t5 + 0x10; // 0x300
                                				_t3 = _t5 + 0xc50; // 0x409753
                                				E004191D0(_t11, _a4, _t3,  *_t2, 0, 0x2c);
                                				_t8 = NtClose(_a8); // executed
                                				return _t8;
                                			}





                                0x00418703
                                0x00418706
                                0x0041870f
                                0x00418717
                                0x00418725
                                0x00418729

                                APIs
                                • NtClose.NTDLL(00413D40,?,?,00413D40,00408B03,FFFFFFFF), ref: 00418725
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close
                                • String ID:
                                • API String ID: 3535843008-0
                                • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction ID: 315d70e0dd0a86a48429d20d502ae4ae3fb499c677b3512a188e9811668946a9
                                • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                • Instruction Fuzzy Hash: 17D01776200218BBE714EB99CC89EE77BACEF48760F154499BA189B242C570FA4086E0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 329 4088c0-4088df call 406e20 332 4088e1-4088e6 329->332 333 4088e7-4088fb call 407030 329->333 336 408900-40892c call 41a0e0 call 41a750 333->336 341 408930-40894c call 413d80 call 413de0 336->341 346 408956-40895f 341->346 347 40894e-408952 341->347 349 408961-408976 call 407060 346->349 347->341 348 408954 347->348 348->349 352 408978-40897a 349->352 353 40897c-408981 call 4070e0 349->353 352->336 352->353 355 408986-40898c 353->355 356 4089a2-4089b7 355->356 357 40898e-40899b 355->357 357->356
                                C-Code - Quality: 93%
                                			E004088C0(intOrPtr _a4) {
                                				intOrPtr _v8;
                                				char _v24;
                                				char _v284;
                                				char _v804;
                                				char _v840;
                                				void* _t24;
                                				void* _t31;
                                				void* _t33;
                                				void* _t34;
                                				void* _t39;
                                				void* _t50;
                                				intOrPtr _t52;
                                				void* _t53;
                                				void* _t54;
                                				void* _t55;
                                				void* _t56;
                                
                                				_t52 = _a4;
                                				_t39 = 0; // executed
                                				_t24 = E00406E20(_t52,  &_v24); // executed
                                				_t54 = _t53 + 8;
                                				if(_t24 != 0) {
                                					E00407030( &_v24,  &_v840);
                                					_t55 = _t54 + 8;
                                					do {
                                						E0041A0E0( &_v284, 0x104);
                                						E0041A750( &_v284,  &_v804);
                                						_t56 = _t55 + 0x10;
                                						_t50 = 0x4f;
                                						while(1) {
                                							_t31 = E00413DE0(E00413D80(_t52, _t50),  &_v284);
                                							_t56 = _t56 + 0x10;
                                							if(_t31 != 0) {
                                								break;
                                							}
                                							_t50 = _t50 + 1;
                                							if(_t50 <= 0x62) {
                                								continue;
                                							} else {
                                							}
                                							goto L8;
                                						}
                                						_t9 = _t52 + 0x14; // 0xffffe1b5
                                						 *(_t52 + 0x474) =  *(_t52 + 0x474) ^  *_t9;
                                						_t39 = 1;
                                						L8:
                                						_t33 = E00407060( &_v24,  &_v840);
                                						_t55 = _t56 + 8;
                                					} while (_t33 != 0 && _t39 == 0);
                                					_t34 = E004070E0(_t52,  &_v24); // executed
                                					if(_t39 == 0) {
                                						asm("rdtsc");
                                						asm("rdtsc");
                                						_v8 = _t34 - 0 + _t34;
                                						 *((intOrPtr*)(_t52 + 0x55c)) =  *((intOrPtr*)(_t52 + 0x55c)) + 0xffffffba;
                                					}
                                					 *((intOrPtr*)(_t52 + 0x31)) =  *((intOrPtr*)(_t52 + 0x31)) + _t39;
                                					_t20 = _t52 + 0x31; // 0x5608758b
                                					 *((intOrPtr*)(_t52 + 0x32)) =  *((intOrPtr*)(_t52 + 0x32)) +  *_t20 + 1;
                                					return 1;
                                				} else {
                                					return _t24;
                                				}
                                			}



















                                0x004088cb
                                0x004088d3
                                0x004088d5
                                0x004088da
                                0x004088df
                                0x004088f2
                                0x004088f7
                                0x00408900
                                0x0040890c
                                0x0040891f
                                0x00408924
                                0x00408927
                                0x00408930
                                0x00408942
                                0x00408947
                                0x0040894c
                                0x00000000
                                0x00000000
                                0x0040894e
                                0x00408952
                                0x00000000
                                0x00000000
                                0x00408954
                                0x00000000
                                0x00408952
                                0x00408956
                                0x00408959
                                0x0040895f
                                0x00408961
                                0x0040896c
                                0x00408971
                                0x00408974
                                0x00408981
                                0x0040898c
                                0x0040898e
                                0x00408994
                                0x00408998
                                0x0040899b
                                0x0040899b
                                0x004089a2
                                0x004089a5
                                0x004089aa
                                0x004089b7
                                0x004088e6
                                0x004088e6
                                0x004088e6

                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6f53d8dba07d61e040243f166c963dc1666f7821a055405fa8867365c30c6fdc
                                • Instruction ID: 45e1b5456bc83a9244d52dfc8b0508b5930111f9c3f75bdf3035c43f7544f730
                                • Opcode Fuzzy Hash: 6f53d8dba07d61e040243f166c963dc1666f7821a055405fa8867365c30c6fdc
                                • Instruction Fuzzy Hash: C8212BB2D442085BCB11E6609D42BFF736C9B14304F04017FE989A2181FA38AB498BA7
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3 4188a0-4188d1 call 4191d0 RtlAllocateHeap
                                C-Code - Quality: 100%
                                			E004188A0(intOrPtr _a4, char _a8, long _a12, long _a16) {
                                				void* _t10;
                                				void* _t15;
                                
                                				E004191D0(_t15, _a4, _a4 + 0xc70,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x34);
                                				_t6 =  &_a8; // 0x413526
                                				_t10 = RtlAllocateHeap( *_t6, _a12, _a16); // executed
                                				return _t10;
                                			}





                                0x004188b7
                                0x004188c2
                                0x004188cd
                                0x004188d1

                                APIs
                                • RtlAllocateHeap.NTDLL(&5A,?,00413C9F,00413C9F,?,00413526,?,?,?,?,?,00000000,00408B03,?), ref: 004188CD
                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID: &5A
                                • API String ID: 1279760036-1617645808
                                • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction ID: 5cd9cf05846361427c9380675d72c553918c9354c3ac6328093719e9b08428cf
                                • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                • Instruction Fuzzy Hash: 8DE012B1200208ABDB18EF99CC45EA777ACAF88654F158559FE085B242C630F910CAB0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 103 4188e0-418911 call 4191d0 RtlFreeHeap
                                APIs
                                • RtlFreeHeap.NTDLL(00000060,00408B03,?,?,00408B03,00000060,00000000,00000000,?,?,00408B03,?,00000000), ref: 0041890D
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction ID: d5064c9333f2c86e90799a0952281b4505df08c213c274bd60dc18c3aad5e7c3
                                • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                • Instruction Fuzzy Hash: D6E012B1200208ABDB18EF99CC49EA777ACAF88750F018559FE085B242C630E910CAB0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Strings
                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: (,/1$rDz
                                • API String ID: 0-3058485086
                                • Opcode ID: d1a2dacd7e16d65ea047bb829ec2ea915e9855e41fa1299a545afaa17ab7236a
                                • Instruction ID: be8fd1a886aba471fb9c8b8c1a47acffcf2603595e109334f7766d00e483898b
                                • Opcode Fuzzy Hash: d1a2dacd7e16d65ea047bb829ec2ea915e9855e41fa1299a545afaa17ab7236a
                                • Instruction Fuzzy Hash: 65E0C232E4451A9EC6208E8AEC421B0F720F70A672F441796EE0873F61A122847382ED
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 37%
                                			E00415652(void* __eax) {
                                
                                				asm("adc al, 0x75");
                                				return __eax;
                                			}



                                0x0041567a
                                0x00415686

                                Memory Dump Source
                                • Source File: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_4_2_400000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 49fed755682ada16b0acf9c5afc926eb963d8b6596879441eb104c1e809cbf71
                                • Instruction ID: 5c6a62ab4bc7ceebb87388fb71f4a8924917daec533ca27df148c51be80d2b07
                                • Opcode Fuzzy Hash: 49fed755682ada16b0acf9c5afc926eb963d8b6596879441eb104c1e809cbf71
                                • Instruction Fuzzy Hash: B0A01223E4A0041094100C483C401F5E374D2C7035D603393DC0C734001082C41300CD
                                Uniqueness

                                Uniqueness Score: -1.00%