Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oAE7nqtsNA.exe

Overview

General Information

Sample Name:oAE7nqtsNA.exe
Analysis ID:652383
MD5:0f20f2a0d366d09d7f9775220f024638
SHA1:e838dc5484de4f2bc6d43290e8e2e860f32182de
SHA256:c5d4a26f1de9008689bf4ecf2eebd6c860282f32db70d982f5281c4630fb4cac
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • oAE7nqtsNA.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\oAE7nqtsNA.exe" MD5: 0F20F2A0D366D09D7F9775220F024638)
    • oAE7nqtsNA.exe (PID: 6516 cmdline: C:\Users\user\Desktop\oAE7nqtsNA.exe MD5: 0F20F2A0D366D09D7F9775220F024638)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "frankjoelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "frankjoe@valete.buzz"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x17418:$x1: $%SMTPDV$
          • 0x1742e:$x2: $#TheHashHere%&
          • 0x187c8:$x3: %FTPDV$
          • 0x18890:$x4: $%TelegramDv$
          • 0x14d34:$x5: KeyLoggerEventArgs
          • 0x150ca:$x5: KeyLoggerEventArgs
          • 0x18838:$m1: | Snake Keylogger
          • 0x188f0:$m1: | Snake Keylogger
          • 0x18a44:$m1: | Snake Keylogger
          • 0x18b6a:$m1: | Snake Keylogger
          • 0x18cc4:$m1: | Snake Keylogger
          • 0x187ec:$m2: Clipboard Logs ID
          • 0x189fa:$m2: Screenshot Logs ID
          • 0x18b0e:$m2: keystroke Logs ID
          • 0x18cfa:$m3: SnakePW
          • 0x189d2:$m4: \SnakeKeylogger\
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b35e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x3af7e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x5a99e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a547:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x3a167:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x59b87:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a98e:$a4: \Orbitum\User Data\Default\Login Data
          • 0x3a5ae:$a4: \Orbitum\User Data\Default\Login Data
          • 0x59fce:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1bb0f:$a5: \Kometa\User Data\Default\Login Data
          • 0x3b72f:$a5: \Kometa\User Data\Default\Login Data
          • 0x5b14f:$a5: \Kometa\User Data\Default\Login Data
          0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 73 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: oAE7nqtsNA.exeVirustotal: Detection: 36%Perma Link
                  Source: oAE7nqtsNA.exeReversingLabs: Detection: 61%
                  Source: oAE7nqtsNA.exeAvira: detected
                  Source: oAE7nqtsNA.exeJoe Sandbox ML: detected
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "frankjoelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "frankjoe@valete.buzz"}
                  Source: oAE7nqtsNA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: oAE7nqtsNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03028687h5_2_030283C9
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F539h5_2_0302F280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 030263D1h5_2_03026111
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027507h5_2_03027196
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302EC8Ah5_2_0302E758
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027967h5_2_030276A8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F991h5_2_0302F6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h5_2_030266F8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03025F70h5_2_03025587
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027DC7h5_2_03027B08
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302FDE9h5_2_0302FB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03028227h5_2_03027F68
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F0E1h5_2_0302EE28
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h5_2_030266E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h5_2_03026A3E
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_03024AA8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9FAE1h5_2_05B9F838
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9F231h5_2_05B9EF88
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9F689h5_2_05B9F3E0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9EDD9h5_2_05B9EB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E529h5_2_05B9E280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E981h5_2_05B9E6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97441h5_2_05B97198
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97899h5_2_05B975F0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94479h5_2_05B941D0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93BC9h5_2_05B93920
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94021h5_2_05B93D78
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96FE9h5_2_05B96D40
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96739h5_2_05B96490
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96B91h5_2_05B968E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93771h5_2_05B934C8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B962E1h5_2_05B96038
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_05B9C020
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_05B9C00F
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93319h5_2_05B93070
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95A31h5_2_05B95788
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95E89h5_2_05B95BE0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B955D9h5_2_05B95330
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_05B9C336
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B989F9h5_2_05B98750
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B98149h5_2_05B97EA0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94D29h5_2_05B94A80
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B985A1h5_2_05B982F8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95181h5_2_05B94ED8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B948D1h5_2_05B94628
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E0A9h5_2_05B9DE00
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97CF1h5_2_05B97A48

                  Networking

                  barindex
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373406882.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com8
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comCm
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comcom2:
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.378280858.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: oAE7nqtsNA.exe, 00000000.00000003.386273147.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers$4
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377796525.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: oAE7nqtsNA.exe, 00000000.00000003.379329452.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers94
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377820878.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377871680.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
                  Source: oAE7nqtsNA.exe, 00000000.00000003.379545847.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379660966.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379618788.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
                  Source: oAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaA
                  Source: oAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: oAE7nqtsNA.exe, 00000000.00000003.372589089.00000000085DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.382162334.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/j
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: oAE7nqtsNA.exe, 00000000.00000003.386180535.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.386020175.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                  Source: oAE7nqtsNA.exe, 00000000.00000003.385023609.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385142286.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385086768.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.u5Ifm
                  Source: oAE7nqtsNA.exe, 00000000.00000003.370199665.00000000085D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.375462201.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375487989.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375434034.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375524462.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375549410.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372804822.00000000085E0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnt
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comu?sg
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deM?
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380334792.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deQ?og
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deet
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deoM?
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.der
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: oAE7nqtsNA.exeString found in binary or memory: https://picsum.photos/80
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                  System Summary

                  barindex
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: oAE7nqtsNA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E631880_2_09E63188
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E604480_2_09E60448
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C04780_2_015C0478
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C17A00_2_015C17A0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C04680_2_015C0468
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C17900_2_015C1790
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_00EA5B9B0_2_00EA5B9B
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030283C95_2_030283C9
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302A3E45_2_0302A3E4
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302F2805_2_0302F280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030261115_2_03026111
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030271965_2_03027196
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302E7585_2_0302E758
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030276A85_2_030276A8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302F6D85_2_0302F6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030255875_2_03025587
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027B085_2_03027B08
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302FB305_2_0302FB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03026B885_2_03026B88
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027F685_2_03027F68
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302EE285_2_0302EE28
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030272485_2_03027248
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03026B785_2_03026B78
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03024A985_2_03024A98
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03024AA85_2_03024AA8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302DFD05_2_0302DFD0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302DFE05_2_0302DFE0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F8385_2_05B9F838
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EF885_2_05B9EF88
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F3E05_2_05B9F3E0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EB305_2_05B9EB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E2805_2_05B9E280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E6D85_2_05B9E6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B971985_2_05B97198
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B971885_2_05B97188
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B975F05_2_05B975F0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9DDF05_2_05B9DDF0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B975E45_2_05B975E4
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B941D05_2_05B941D0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B941C05_2_05B941C0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96D365_2_05B96D36
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B939205_2_05B93920
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B939105_2_05B93910
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93D785_2_05B93D78
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93D685_2_05B93D68
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96D405_2_05B96D40
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B934B85_2_05B934B8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9D0985_2_05B9D098
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B964905_2_05B96490
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B964825_2_05B96482
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B968E85_2_05B968E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B968D85_2_05B968D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B934C85_2_05B934C8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B960385_2_05B96038
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F8285_2_05B9F828
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9602E5_2_05B9602E
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C0205_2_05B9C020
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B900165_2_05B90016
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C00F5_2_05B9C00F
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B930705_2_05B93070
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B930625_2_05B93062
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B900405_2_05B90040
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B98BA85_2_05B98BA8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C3985_2_05B9C398
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B957885_2_05B95788
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95BE05_2_05B95BE0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95BD05_2_05B95BD0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F3D05_2_05B9F3D0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B953305_2_05B95330
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B953215_2_05B95321
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EB205_2_05B9EB20
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EF795_2_05B9EF79
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B957785_2_05B95778
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9B7705_2_05B9B770
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B987505_2_05B98750
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B987415_2_05B98741
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97EA05_2_05B97EA0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97E905_2_05B97E90
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94A805_2_05B94A80
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B982F85_2_05B982F8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B982E85_2_05B982E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94ED85_2_05B94ED8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9B6C95_2_05B9B6C9
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94EC85_2_05B94EC8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E6C85_2_05B9E6C8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97A3A5_2_05B97A3A
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B946285_2_05B94628
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B946195_2_05B94619
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9DE005_2_05B9DE00
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E2715_2_05B9E271
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94A705_2_05B94A70
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97A485_2_05B97A48
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_00ED5B9B5_2_00ED5B9B
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilename vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423797246.0000000009E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423808559.0000000009FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.416673609.00000000032CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.418556938.0000000004B58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423555614.0000000009E50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilename vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000000.410873708.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633182026.00000000015F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000002.632877119.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilenameMessage.exe> vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: oAE7nqtsNA.exeVirustotal: Detection: 36%
                  Source: oAE7nqtsNA.exeReversingLabs: Detection: 61%
                  Source: oAE7nqtsNA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe "C:\Users\user\Desktop\oAE7nqtsNA.exe"
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exe
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exeJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oAE7nqtsNA.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: oAE7nqtsNA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: oAE7nqtsNA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: oAE7nqtsNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: oAE7nqtsNA.exeStatic PE information: 0xD255CC74 [Tue Oct 28 00:51:00 2081 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8977969416018095
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exe TID: 1352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E51515 sldt word ptr [eax]0_2_09E51515
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: oAE7nqtsNA.exe, 00000005.00000003.433785722.000000000164C000.00000004.00000020.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633218107.0000000001624000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03025587 LdrInitializeThunk,5_2_03025587
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeMemory written: C:\Users\user\Desktop\oAE7nqtsNA.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exeJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Users\user\Desktop\oAE7nqtsNA.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Users\user\Desktop\oAE7nqtsNA.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  oAE7nqtsNA.exe37%VirustotalBrowse
                  oAE7nqtsNA.exe62%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                  oAE7nqtsNA.exe100%AviraHEUR/AGEN.1202539
                  oAE7nqtsNA.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  5.0.oAE7nqtsNA.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.2.oAE7nqtsNA.exe.e60000.1.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.9.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.7.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.2.oAE7nqtsNA.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.3.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.13.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.5.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.11.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.1.unpack100%AviraHEUR/AGEN.1202539Download File
                  0.2.oAE7nqtsNA.exe.e30000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  0.0.oAE7nqtsNA.exe.e30000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.2.unpack100%AviraHEUR/AGEN.1202539Download File
                  SourceDetectionScannerLabelLink
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://www.tiro.comnt0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.carterandcone.comcom2:0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.monotype.u5Ifm0%Avira URL Cloudsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://checkip.dyndns.org40%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.fontbureau.comgrita0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://www.carterandcone.com80%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.carterandcone.comCm0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.de0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.galapagosdesign.com/j0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/0%URL Reputationsafe
                  http://www.tiro.comn0%URL Reputationsafe
                  http://www.urwpp.deQ?og0%Avira URL Cloudsafe
                  http://www.urwpp.deet0%Avira URL Cloudsafe
                  http://www.fontbureau.comaA0%Avira URL Cloudsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.tiro.comu?sg0%Avira URL Cloudsafe
                  http://www.monotype.0%URL Reputationsafe
                  http://www.urwpp.deoM?0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.urwpp.der0%URL Reputationsafe
                  http://www.urwpp.deM?0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  checkip.dyndns.com
                  193.122.130.0
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.fontbureau.com/designersGoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.tiro.comntoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/bTheoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/botoAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.carterandcone.comcom2:oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372804822.00000000085E0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersoAE7nqtsNA.exe, 00000000.00000003.378280858.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.kroAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comoAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373406882.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.monotype.u5IfmoAE7nqtsNA.exe, 00000000.00000003.385023609.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385142286.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385086768.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comoAE7nqtsNA.exe, 00000000.00000003.370199665.00000000085D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org4oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comgritaoAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.com8oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/qoAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comCmoAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.kroAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.comoAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deoAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameoAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designerspoAE7nqtsNA.exe, 00000000.00000003.377820878.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377871680.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.comoAE7nqtsNA.exe, 00000000.00000003.375462201.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375487989.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375434034.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375524462.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375549410.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersroAE7nqtsNA.exe, 00000000.00000003.379545847.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379660966.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379618788.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/joAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.galapagosdesign.com/oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.382162334.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.tiro.comnoAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deQ?ogoAE7nqtsNA.exe, 00000000.00000003.380334792.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.urwpp.deetoAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.comaAoAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://checkip.dyndns.orgoAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comloAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/oAE7nqtsNA.exe, 00000000.00000003.372589089.00000000085DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cnoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmloAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers$4oAE7nqtsNA.exe, 00000000.00000003.386273147.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.tiro.comu?sgoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.monotype.oAE7nqtsNA.exe, 00000000.00000003.386180535.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.386020175.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deoM?oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deroAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deM?oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers8oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers94oAE7nqtsNA.exe, 00000000.00000003.379329452.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://picsum.photos/80oAE7nqtsNA.exefalse
                                                    high
                                                    http://www.fontbureau.com/designers/oAE7nqtsNA.exe, 00000000.00000003.377796525.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      193.122.130.0
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      Joe Sandbox Version:35.0.0 Citrine
                                                      Analysis ID:652383
                                                      Start date and time: 26/06/202209:31:102022-06-26 09:31:10 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 10m 32s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Sample file name:oAE7nqtsNA.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:19
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:
                                                      • Successful, ratio: 0.3% (good quality ratio 0.2%)
                                                      • Quality average: 50.9%
                                                      • Quality standard deviation: 43.7%
                                                      HCA Information:
                                                      • Successful, ratio: 94%
                                                      • Number of executed functions: 43
                                                      • Number of non-executed functions: 27
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      09:32:33API Interceptor1x Sleep call for process: oAE7nqtsNA.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      193.122.130.00OZQi3b0tM.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      ZzO0LX45zz.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      FNK08uYGy6.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      4vQAHpapFz.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      aercUUUX2C.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      Import shipment.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      tka30O3OZN.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      ViAKIk7T7X.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      4008765678900--98765.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      F96UcEk8Z9.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      t5nmFGhdVA.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      Order Details.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      uc2RxH8hO7.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      gsjRXEqpy51bLEm.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      RFQ_5076414.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      0043302751 22062022 pdf.exeGet hashmaliciousBrowse
                                                      • checkip.dyndns.org/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      checkip.dyndns.com0OZQi3b0tM.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      ZzO0LX45zz.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      FNK08uYGy6.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      MV CHINALAND.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      Import shipment.exeGet hashmaliciousBrowse
                                                      • 132.226.247.73
                                                      MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      4vQAHpapFz.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                                      • 193.122.6.168
                                                      gD5LFrPtfc.exeGet hashmaliciousBrowse
                                                      • 132.226.247.73
                                                      aercUUUX2C.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      vSgQo7dqYG.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      MV CHINALAND.exeGet hashmaliciousBrowse
                                                      • 132.226.8.169
                                                      22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      Import shipment.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      tka30O3OZN.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                      • 132.226.247.73
                                                      Docume001.exeGet hashmaliciousBrowse
                                                      • 132.226.8.169
                                                      ViAKIk7T7X.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      ORACLE-BMC-31898US0OZQi3b0tM.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      ZzO0LX45zz.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      FNK08uYGy6.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      MV CHINALAND.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      4vQAHpapFz.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                                      • 193.122.6.168
                                                      aercUUUX2C.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      vSgQo7dqYG.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                                      • 158.101.44.242
                                                      CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      Import shipment.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      tka30O3OZN.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      ViAKIk7T7X.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      4008765678900--98765.exeGet hashmaliciousBrowse
                                                      • 193.122.130.0
                                                      https://wallpaperaccess.com/miami-nightGet hashmaliciousBrowse
                                                      • 150.136.25.38
                                                      b8sqHJocuX.exeGet hashmaliciousBrowse
                                                      • 193.122.6.168
                                                      report.exeGet hashmaliciousBrowse
                                                      • 193.122.6.168
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.8910721031299795
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:oAE7nqtsNA.exe
                                                      File size:539136
                                                      MD5:0f20f2a0d366d09d7f9775220f024638
                                                      SHA1:e838dc5484de4f2bc6d43290e8e2e860f32182de
                                                      SHA256:c5d4a26f1de9008689bf4ecf2eebd6c860282f32db70d982f5281c4630fb4cac
                                                      SHA512:dea80ff93a97c82cc8d8e84e1cb3ccc7bec651d1fe30d168c8fb466ec1e15647f11ff14fffeabf269a1b80f1610df28355dbbb5494585455757fd8963d47061e
                                                      SSDEEP:12288:hDK3rT/keuQ94+66h1FNHXOEo0ItTvbs8FK05gY/:hDKbnhh1FFOEetPs8
                                                      TLSH:04B4D09D322472EFC857D076DEA82C78AB60347B531B8213941325EE9A5DA97CF214F3
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.U...............0..2...........Q... ...`....@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x48511e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0xD255CC74 [Tue Oct 28 00:51:00 2081 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x850cc0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x398.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x831240x83200False0.920081997735939data7.8977969416018095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x860000x3980x400False0.37890625data2.9056920095509953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x880000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0x860580x33cdata
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 26, 2022 09:32:49.748342991 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.860111952 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:49.861855030 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.865596056 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.977227926 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:49.977797985 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:50.085800886 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:33:54.977902889 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:33:54.981185913 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:34:30.021599054 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:34:30.133021116 CEST8049769193.122.130.0192.168.2.6
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 26, 2022 09:32:49.640799046 CEST5174853192.168.2.68.8.8.8
                                                      Jun 26, 2022 09:32:49.662122011 CEST53517488.8.8.8192.168.2.6
                                                      Jun 26, 2022 09:32:49.690249920 CEST6111653192.168.2.68.8.8.8
                                                      Jun 26, 2022 09:32:49.711349010 CEST53611168.8.8.8192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jun 26, 2022 09:32:49.640799046 CEST192.168.2.68.8.8.80x372bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.690249920 CEST192.168.2.68.8.8.80x7319Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                      0192.168.2.649769193.122.130.080C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      TimestampkBytes transferredDirectionData
                                                      Jun 26, 2022 09:32:49.865596056 CEST1086OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jun 26, 2022 09:32:49.977797985 CEST1086INHTTP/1.1 200 OK
                                                      Date: Sun, 26 Jun 2022 07:32:49 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 106
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:09:32:19
                                                      Start date:26/06/2022
                                                      Path:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\oAE7nqtsNA.exe"
                                                      Imagebase:0xe30000
                                                      File size:539136 bytes
                                                      MD5 hash:0F20F2A0D366D09D7F9775220F024638
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:09:32:40
                                                      Start date:26/06/2022
                                                      Path:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Imagebase:0xe60000
                                                      File size:539136 bytes
                                                      MD5 hash:0F20F2A0D366D09D7F9775220F024638
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:12.5%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:83
                                                        Total number of Limit Nodes:3
                                                        execution_graph 11237 15c7068 11238 15c707f 11237->11238 11241 15c6bfc 11238->11241 11240 15c709f 11242 15c6c07 11241->11242 11245 15c6c38 11242->11245 11244 15c7199 11244->11240 11246 15c6c43 11245->11246 11249 15c6ee8 11246->11249 11248 15c730d 11248->11244 11250 15c6ef3 11249->11250 11253 15c6f18 11250->11253 11252 15c73e2 11252->11248 11254 15c6f23 11253->11254 11257 15c6f48 11254->11257 11256 15c74f1 11256->11252 11258 15c6f53 11257->11258 11265 15c9550 11258->11265 11260 15c989b 11262 15c9a86 11260->11262 11270 15cbe61 11260->11270 11261 15c9ac4 11261->11256 11262->11261 11273 15cdfc0 11262->11273 11266 15c955b 11265->11266 11267 15caa3a 11266->11267 11279 15caa98 11266->11279 11283 15caa97 11266->11283 11267->11260 11287 15cbe98 11270->11287 11274 15cdfe1 11273->11274 11275 15ce005 11274->11275 11310 15ce12d 11274->11310 11315 15ce160 11274->11315 11319 15ce170 11274->11319 11275->11261 11280 15caadb 11279->11280 11281 15caae6 KiUserCallbackDispatcher 11280->11281 11282 15cab10 11280->11282 11281->11282 11282->11267 11284 15caa98 11283->11284 11285 15caae6 KiUserCallbackDispatcher 11284->11285 11286 15cab10 11284->11286 11285->11286 11286->11267 11290 15cbf80 11287->11290 11288 15cbe76 11288->11262 11291 15cbfa3 11290->11291 11292 15cbfbb 11291->11292 11298 15cc218 11291->11298 11302 15cc208 11291->11302 11292->11288 11293 15cbfb3 11293->11292 11294 15cc1b8 GetModuleHandleW 11293->11294 11295 15cc1e5 11294->11295 11295->11288 11299 15cc22c 11298->11299 11301 15cc251 11299->11301 11306 15cba20 11299->11306 11301->11293 11303 15cc22c 11302->11303 11304 15cba20 LoadLibraryExW 11303->11304 11305 15cc251 11303->11305 11304->11305 11305->11293 11307 15cc3f8 LoadLibraryExW 11306->11307 11309 15cc471 11307->11309 11309->11301 11311 15ce143 11310->11311 11312 15ce18b 11310->11312 11311->11275 11314 15ce1b7 11312->11314 11323 15cd614 11312->11323 11314->11275 11316 15ce17d 11315->11316 11317 15cd614 4 API calls 11316->11317 11318 15ce1b7 11316->11318 11317->11318 11318->11275 11320 15ce17d 11319->11320 11321 15ce1b7 11320->11321 11322 15cd614 4 API calls 11320->11322 11321->11275 11322->11321 11324 15cd61f 11323->11324 11325 15ceaa8 11324->11325 11327 15cd6fc 11324->11327 11328 15cd707 11327->11328 11329 15c6f48 4 API calls 11328->11329 11330 15ceb17 11328->11330 11329->11330 11330->11325 11331 15ce288 11332 15ce2ee 11331->11332 11336 15ce448 11332->11336 11339 15ce438 11332->11339 11333 15ce39d 11343 15cd69c 11336->11343 11340 15ce448 11339->11340 11341 15cd69c DuplicateHandle 11340->11341 11342 15ce476 11341->11342 11342->11333 11344 15ce4b0 DuplicateHandle 11343->11344 11345 15ce476 11344->11345 11345->11333

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 722 15c17a0-15c17d2 723 15c17d9-15c188c call 15c1f48 722->723 724 15c17d4 722->724 727 15c189d-15c18af 723->727 728 15c188e 723->728 724->723 731 15c18b6-15c194e 727->731 732 15c18b1 727->732 729 15c1edb-15c1ee4 728->729 730 15c1894-15c1897 728->730 733 15c1ef5-15c1f0f 729->733 734 15c1ee6 729->734 730->727 730->729 731->729 732->731 811 15c1f11 call 15c2240 733->811 812 15c1f11 call 15c2232 733->812 736 15c1eec-15c1eef 734->736 737 15c1953-15c1977 734->737 736->733 736->737 738 15c197e-15c1998 737->738 739 15c1979 737->739 745 15c199e-15c19d7 738->745 746 15c1ae5-15c1af4 738->746 739->738 742 15c1f17-15c1f30 756 15c19dd-15c1a5e 745->756 757 15c1a60-15c1aa5 745->757 748 15c1afb-15c1b15 746->748 749 15c1af6 746->749 754 15c1b1b-15c1b2a 748->754 755 15c1cf4-15c1d7e 748->755 749->748 758 15c1b2c 754->758 759 15c1b31-15c1b51 754->759 775 15c1d85-15c1da5 755->775 776 15c1d80 755->776 765 15c1aa8-15c1ae0 756->765 757->765 758->759 766 15c1bff-15c1c0e 759->766 767 15c1b57-15c1b6c 759->767 765->729 769 15c1c15-15c1c35 766->769 770 15c1c10 766->770 771 15c1b6e 767->771 772 15c1b73-15c1b93 767->772 781 15c1c37-15c1c3e 769->781 782 15c1c40-15c1c4f 769->782 770->769 771->772 779 15c1c9f-15c1cef 772->779 780 15c1b99-15c1bfa 772->780 789 15c1e78-15c1e7b 775->789 790 15c1dab-15c1dd8 775->790 776->775 793 15c1e7e-15c1e86 779->793 780->729 785 15c1c93-15c1c9c 781->785 786 15c1c56-15c1c76 782->786 787 15c1c51 782->787 785->779 797 15c1c78-15c1c7f 786->797 798 15c1c81-15c1c8a 786->798 787->786 789->793 794 15c1e1d-15c1e76 790->794 795 15c1dda-15c1e07 790->795 799 15c1e8f-15c1e9b 793->799 800 15c1e88 793->800 794->793 806 15c1e0e-15c1e1b 795->806 802 15c1c8d-15c1c90 797->802 798->802 803 15c1e9d-15c1ea1 799->803 805 15c1ea3-15c1ebe 799->805 800->803 804 15c1e8a-15c1e8d 800->804 802->785 803->733 803->805 804->799 804->803 810 15c1ec6-15c1ed8 805->810 806->793 810->729 811->742 812->742
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a1a075b27652e507f021d74579fb69103df5fff661b2c207cb7b7ae555c2cecb
                                                        • Instruction ID: aba16c246c5526848a5d8c965bfcc0276ce4543eeca886b9f62fcd1f528256a4
                                                        • Opcode Fuzzy Hash: a1a075b27652e507f021d74579fb69103df5fff661b2c207cb7b7ae555c2cecb
                                                        • Instruction Fuzzy Hash: 9E428074E01219CFDB24CFA9D984B9DBBF2BF48310F1581A9E819AB355D730AA85CF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f1884e2819601062ae0c5d9023319daf5c005dbc84448d6f85755667b40adc7c
                                                        • Instruction ID: 1f1f1cc84fcbe352177e4f5462d1801480e3f48bf2788cea238cef45ef522bb5
                                                        • Opcode Fuzzy Hash: f1884e2819601062ae0c5d9023319daf5c005dbc84448d6f85755667b40adc7c
                                                        • Instruction Fuzzy Hash: 2332F174A04219CFDB50CFA9CA80A8EFBF2BF49655F15C199D548AB261CB30DD81CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.423577568.0000000009E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E50000, based on PE: true
                                                        • Associated: 00000000.00000002.423555614.0000000009E50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9e50000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8a1eaab567d74dfbe6c892c8c36eaa092e7d6302607b4f08a4f731a50f27293f
                                                        • Instruction ID: 6bad1504ea0295ab11ff1cf56f48ae844f5ba91a51bff559a3393d111f439def
                                                        • Opcode Fuzzy Hash: 8a1eaab567d74dfbe6c892c8c36eaa092e7d6302607b4f08a4f731a50f27293f
                                                        • Instruction Fuzzy Hash: E8B11731B402159FDB64DFB1C85A7BE76A2ABC4792F158139E9079B390CBB4DC02CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.423577568.0000000009E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E50000, based on PE: true
                                                        • Associated: 00000000.00000002.423555614.0000000009E50000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9e50000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 74d50eea6413d62c4c049b4319bf32d0e26696ba8d109fc16e33aaa6cf928cb0
                                                        • Instruction ID: 655fa5f544e1c6213570e9b5d12519a7ea89a178d35301976426060999f60757
                                                        • Opcode Fuzzy Hash: 74d50eea6413d62c4c049b4319bf32d0e26696ba8d109fc16e33aaa6cf928cb0
                                                        • Instruction Fuzzy Hash: 6A51F530B89241CFD7148FA988066A9BBB1BF8A3D5F15B06BE516CF2A5C734CC45C792
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 73366631bdc45d360d501e6c09b3855aeae0e5c216a6dc6270abb9a0ef3a5dab
                                                        • Instruction ID: 85a0e2fed5cf3aa5ac32f08c1fc3a6b27425031343c227ca58b239a6c10d1e9f
                                                        • Opcode Fuzzy Hash: 73366631bdc45d360d501e6c09b3855aeae0e5c216a6dc6270abb9a0ef3a5dab
                                                        • Instruction Fuzzy Hash: FD61C274E01618CFDB28CFAAD984B9DBBF2BF88300F1581AAD819AB355D7349945CF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e69b8befcaef68113c713f7a37757c700e331b3c579ead542266a29f402a0605
                                                        • Instruction ID: 1b97147cc26f9e7019a3b52fc8f6cbf44725243168e16ef225ce285d96c1e320
                                                        • Opcode Fuzzy Hash: e69b8befcaef68113c713f7a37757c700e331b3c579ead542266a29f402a0605
                                                        • Instruction Fuzzy Hash: 13510975E00619CFDB58CFAAD841B9EBBB2BFC9204F00C0AAD51CAB254DB345A85CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 015CC1D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: ;
                                                        • API String ID: 4139908857-1661535913
                                                        • Opcode ID: b75cdd520ff49b5f6b34270cca4a6f6f2bdb3f1e369f2f5c3cde5b0798f627e6
                                                        • Instruction ID: bb3b98bcf0409202ebca8dc73f59779b406c1cd5f7150dedcbc61275146bd3c3
                                                        • Opcode Fuzzy Hash: b75cdd520ff49b5f6b34270cca4a6f6f2bdb3f1e369f2f5c3cde5b0798f627e6
                                                        • Instruction Fuzzy Hash: B88154B0A00B068FD724CF6AD44579ABBF1BF89614F008A2ED58ADBA50D775E805CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 55 15ce4ab-15ce4af 56 15ce4b0-15ce544 DuplicateHandle 55->56 57 15ce54d-15ce56a 56->57 58 15ce546-15ce54c 56->58 58->57
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015CE476,?,?,?,?,?), ref: 015CE537
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID: ;
                                                        • API String ID: 3793708945-1661535913
                                                        • Opcode ID: 60fd57a83d03a226b8dc1676876073b5a3966b9f4ce17b619ec1664d298c10da
                                                        • Instruction ID: 66b8fb0481e2504307558a6e9f610cb42269194b4a675c834a782929e7701e61
                                                        • Opcode Fuzzy Hash: 60fd57a83d03a226b8dc1676876073b5a3966b9f4ce17b619ec1664d298c10da
                                                        • Instruction Fuzzy Hash: FD21E6B59002089FDB10CFA9E585ADEBFF4FB48324F14841AE914A7750D374A955CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 61 15cd69c-15ce544 DuplicateHandle 63 15ce54d-15ce56a 61->63 64 15ce546-15ce54c 61->64 64->63
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015CE476,?,?,?,?,?), ref: 015CE537
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID: ;
                                                        • API String ID: 3793708945-1661535913
                                                        • Opcode ID: 90cc4932fb50f8d8eab6ba5d8d6eeccda71b3d6791ca17561b9be4068ecdb041
                                                        • Instruction ID: cf405b5f4d2a80939fc6e11cacc9f3841a9bfc5e18a2d50e79333feb6929ef30
                                                        • Opcode Fuzzy Hash: 90cc4932fb50f8d8eab6ba5d8d6eeccda71b3d6791ca17561b9be4068ecdb041
                                                        • Instruction Fuzzy Hash: 3321E3B5900208EFDB10CFA9D985AEEBFF4FB48324F14841AE914A7350D378A954CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 75 15cc3f0-15cc438 76 15cc43a-15cc43d 75->76 77 15cc440-15cc46f LoadLibraryExW 75->77 76->77 78 15cc478-15cc495 77->78 79 15cc471-15cc477 77->79 79->78
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015CC251,00000800,00000000,00000000), ref: 015CC462
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: ;
                                                        • API String ID: 1029625771-1661535913
                                                        • Opcode ID: d232ef3683c639efd17c02e196aec6565e98bd74f7096b7f7990fb423cfb6086
                                                        • Instruction ID: cca0ae47ed7196fa0c3a86f9659a26ffe28212ff50adf613a8246cab85c08475
                                                        • Opcode Fuzzy Hash: d232ef3683c639efd17c02e196aec6565e98bd74f7096b7f7990fb423cfb6086
                                                        • Instruction Fuzzy Hash: D22147B29002098FDB10CFA9C484BDEFBF4FB49724F14851ED519A7640C3749545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 67 15cba20-15cc438 69 15cc43a-15cc43d 67->69 70 15cc440-15cc46f LoadLibraryExW 67->70 69->70 71 15cc478-15cc495 70->71 72 15cc471-15cc477 70->72 72->71
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015CC251,00000800,00000000,00000000), ref: 015CC462
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: ;
                                                        • API String ID: 1029625771-1661535913
                                                        • Opcode ID: ec3cc3ddbd29d11e1bd18df7d07d251238290aec1c716e9696b11cf2336d5486
                                                        • Instruction ID: 6f0be0a3c9363b3c8fd257abab6d661307ea4adc24a652625ad4e9d5c20a6aca
                                                        • Opcode Fuzzy Hash: ec3cc3ddbd29d11e1bd18df7d07d251238290aec1c716e9696b11cf2336d5486
                                                        • Instruction Fuzzy Hash: AB1106B69002099FDB10CF9AD484BEEFBF4EB98724F14842ED519A7600C375A545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 82 15caa97-15caae4 85 15caae6-15cab0e KiUserCallbackDispatcher 82->85 86 15cab32-15cab4b 82->86 87 15cab17-15cab2b 85->87 88 15cab10-15cab16 85->88 87->86 88->87
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 015CAAFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID: ;
                                                        • API String ID: 2492992576-1661535913
                                                        • Opcode ID: e97d76ecfd9fe8a9c7e998f423f8a02021ce82f7ba0ae74a465ee33391d9de5f
                                                        • Instruction ID: 4ee95448a7bd601b536fa123551ae0af547917b3f98e5944ea93a40037b1715d
                                                        • Opcode Fuzzy Hash: e97d76ecfd9fe8a9c7e998f423f8a02021ce82f7ba0ae74a465ee33391d9de5f
                                                        • Instruction Fuzzy Hash: FD11D0B18003998EDB10DF99E5087DEBFF4EB56314F10845AD454A7641DB785644CFA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 90 15caa98-15caae4 92 15caae6-15cab0e KiUserCallbackDispatcher 90->92 93 15cab32-15cab4b 90->93 94 15cab17-15cab2b 92->94 95 15cab10-15cab16 92->95 94->93 95->94
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 015CAAFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID: ;
                                                        • API String ID: 2492992576-1661535913
                                                        • Opcode ID: e0ed90ae76f4af591ffb8d5633cfd88ad63de31e5697e8562ffacfc4d5d0aef9
                                                        • Instruction ID: 10938851fc4a79b718d4122ba46c24d257dee1f5e3cfba545fd7912568282030
                                                        • Opcode Fuzzy Hash: e0ed90ae76f4af591ffb8d5633cfd88ad63de31e5697e8562ffacfc4d5d0aef9
                                                        • Instruction Fuzzy Hash: 2811DDB18003998EDB10DF99E5087DEBFF4EB56324F10846AD454A7281DB789A48CFA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 97 15cc170-15cc1b0 98 15cc1b8-15cc1e3 GetModuleHandleW 97->98 99 15cc1b2-15cc1b5 97->99 100 15cc1ec-15cc200 98->100 101 15cc1e5-15cc1eb 98->101 99->98 101->100
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 015CC1D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.416184850.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15c0000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: ;
                                                        • API String ID: 4139908857-1661535913
                                                        • Opcode ID: 4a88833a8321e1f6a5880c52ed53098e95cdc64ea3219a9d1bca5073295464e9
                                                        • Instruction ID: f064481c9ea6155dd3a31133af56b90b08280dc7082726032bb5ef057cccaf48
                                                        • Opcode Fuzzy Hash: 4a88833a8321e1f6a5880c52ed53098e95cdc64ea3219a9d1bca5073295464e9
                                                        • Instruction Fuzzy Hash: 5311E0B6D006498FDB10CF9AD844BDEFBF4EB89724F14841AD929B7600C379A545CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.423555614.0000000009E50000.00000004.08000000.00040000.00000000.sdmp, Offset: 09E50000, based on PE: true
                                                        • Associated: 00000000.00000002.423577568.0000000009E60000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9e50000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3f18ab462e1d62c6bbd7d19377aa31a505d409f6ee43ca06bfc22e0843ca504
                                                        • Instruction ID: aceedbc0df6b9e0ff7cb25a2f720c2f39c6b9dad5e8a36b0287756d8f78dd787
                                                        • Opcode Fuzzy Hash: e3f18ab462e1d62c6bbd7d19377aa31a505d409f6ee43ca06bfc22e0843ca504
                                                        • Instruction Fuzzy Hash: 0151256244E7D14FC7138B789CB16D07FB0AE13224B1E45CBC4C1CF0A3E269995ADB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:9%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:51.8%
                                                        Total number of Nodes:56
                                                        Total number of Limit Nodes:2
                                                        execution_graph 15953 3023460 15954 302347c KiUserExceptionDispatcher 15953->15954 15956 3023511 15954->15956 15975 5b9e271 15956->15975 15979 5b9e280 15956->15979 15957 3023604 15983 5b9e6d8 15957->15983 15987 5b9e6c8 15957->15987 15958 302360b 15991 5b9eb20 15958->15991 15995 5b9eb30 15958->15995 15959 3023612 15999 5b9ef79 15959->15999 16003 5b9ef88 15959->16003 15960 3023619 16007 5b9f3d0 15960->16007 16011 5b9f3e0 15960->16011 15961 3023620 16015 5b9f838 15961->16015 16019 5b9f828 15961->16019 15962 3023627 15976 5b9e278 KiUserExceptionDispatcher 15975->15976 15978 5b9e35c 15976->15978 15978->15957 15980 5b9e2a2 KiUserExceptionDispatcher 15979->15980 15982 5b9e35c 15980->15982 15982->15957 15984 5b9e6d9 KiUserExceptionDispatcher 15983->15984 15986 5b9e7b4 15984->15986 15986->15958 15988 5b9e6cc KiUserExceptionDispatcher 15987->15988 15990 5b9e7b4 15988->15990 15990->15958 15992 5b9eb52 KiUserExceptionDispatcher 15991->15992 15994 5b9ec0c 15992->15994 15994->15959 15996 5b9eb52 KiUserExceptionDispatcher 15995->15996 15998 5b9ec0c 15996->15998 15998->15959 16000 5b9ef7c KiUserExceptionDispatcher 15999->16000 16002 5b9f064 16000->16002 16002->15960 16004 5b9ef89 KiUserExceptionDispatcher 16003->16004 16006 5b9f064 16004->16006 16006->15960 16008 5b9f3d4 KiUserExceptionDispatcher 16007->16008 16010 5b9f4bc 16008->16010 16010->15961 16012 5b9f402 KiUserExceptionDispatcher 16011->16012 16014 5b9f4bc 16012->16014 16014->15961 16016 5b9f85a KiUserExceptionDispatcher 16015->16016 16018 5b9f914 16016->16018 16018->15962 16020 5b9f82c KiUserExceptionDispatcher 16019->16020 16022 5b9f914 16020->16022 16022->15962 16023 3026111 16024 3026142 KiUserExceptionDispatcher 16023->16024 16026 30261fe 16024->16026 16027 3025587 16028 30255ba 16027->16028 16029 30255bf LdrInitializeThunk 16027->16029 16028->16029 16030 3025653 16029->16030 16031 30283c9 16034 30283fa 16031->16034 16032 30287df 16033 3028549 KiUserExceptionDispatcher 16033->16034 16034->16032 16034->16033

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 554 3025587-30255b8 555 30255ba 554->555 556 30255bf-302564c LdrInitializeThunk 554->556 555->556 557 3025653-302571b 556->557 564 3025fb4-3025fd3 557->564 565 3025720-302572c 564->565 566 3025fd9-302600e 564->566 568 3025733-3025799 565->568 569 302572e 565->569 573 30257a0-302582d 568->573 574 302579b 568->574 569->568 580 302583f-3025846 573->580 581 302582f-3025836 573->581 574->573 584 3025848 580->584 585 302584d-302585a 580->585 582 3025838 581->582 583 302583d 581->583 582->583 583->585 584->585 586 3025861-3025868 585->586 587 302585c 585->587 588 302586a 586->588 589 302586f-30258c6 586->589 587->586 588->589 592 30258c8 589->592 593 30258cd-30258e4 589->593 592->593 594 30258e6-30258ed 593->594 595 30258ef-30258f7 593->595 596 30258f8-3025902 594->596 595->596 597 3025904 596->597 598 3025909-3025912 596->598 597->598 599 3025f84-3025f8a 598->599 600 3025f90-3025faa 599->600 601 3025917-3025923 599->601 609 3025fb1 600->609 610 3025fac 600->610 602 3025925 601->602 603 302592a-302592f 601->603 602->603 604 3025972-3025974 603->604 605 3025931-302593d 603->605 611 302597a-302598e 604->611 607 3025944-3025949 605->607 608 302593f 605->608 607->604 612 302594b-3025958 607->612 608->607 609->564 610->609 613 3025f62-3025f6f 611->613 614 3025994-30259a9 611->614 615 302595a 612->615 616 302595f-3025970 612->616 619 3025f70-3025f7a 613->619 617 30259b0-3025a30 614->617 618 30259ab 614->618 615->616 616->611 626 3025a32-3025a58 617->626 627 3025a5a 617->627 618->617 620 3025f81 619->620 621 3025f7c 619->621 620->599 621->620 628 3025a64-3025a78 626->628 627->628 630 3025bc1-3025bc6 628->630 631 3025a7e-3025a88 628->631 634 3025c2a-3025c2c 630->634 635 3025bc8-3025be8 630->635 632 3025a8a 631->632 633 3025a8f-3025aa9 631->633 632->633 636 3025ac0-3025ac2 633->636 637 3025aab-3025ab5 633->637 638 3025c32-3025c46 634->638 645 3025c12 635->645 646 3025bea-3025c10 635->646 642 3025b4c-3025b58 636->642 640 3025ab7 637->640 641 3025abc-3025abf 637->641 643 3025f5c-3025f5d 638->643 644 3025c4c-3025c56 638->644 640->641 641->636 647 3025b5a 642->647 648 3025b5f-3025b64 642->648 651 3025f5e-3025f60 643->651 649 3025c58 644->649 650 3025c5d-3025c77 644->650 652 3025c1c-3025c28 645->652 646->652 647->648 653 3025b66-3025b73 648->653 654 3025b8b-3025b8d 648->654 649->650 655 3025c79-3025c83 650->655 656 3025c8e-3025c9c 650->656 651->619 652->638 659 3025b75 653->659 660 3025b7a-3025b89 653->660 661 3025b93-3025ba1 654->661 662 3025c85 655->662 663 3025c8a-3025c8d 655->663 657 3025d2c-3025d38 656->657 666 3025d3a 657->666 667 3025d3f-3025d44 657->667 659->660 660->661 664 3025ac7-3025adc 661->664 665 3025ba7-3025bbc 661->665 662->663 663->656 670 3025ae3-3025b41 664->670 671 3025ade 664->671 665->651 666->667 668 3025d46-3025d53 667->668 669 3025d6b-3025d6d 667->669 672 3025d55 668->672 673 3025d5a-3025d69 668->673 674 3025d73-3025d87 669->674 690 3025b43 670->690 691 3025b48-3025b4b 670->691 671->670 672->673 673->674 675 3025ca1-3025cb9 674->675 676 3025d8d-3025df9 call 30243f8 * 2 674->676 678 3025cc0-3025d21 675->678 679 3025cbb 675->679 688 3025e02-3025f58 676->688 689 3025dfb-3025dfd 676->689 695 3025d23 678->695 696 3025d28-3025d2b 678->696 679->678 692 3025f59-3025f5a 688->692 689->692 690->691 691->642 692->600 695->696 696->657
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: f31ab7687d756c1de6cf621196ea59801bb15fb20eb1f6ef54d872b6dd26f6c2
                                                        • Instruction ID: e8ff72c69cb10a9b7c9fe9b2eafa3c2d5856073864c2d633703afca17d344e79
                                                        • Opcode Fuzzy Hash: f31ab7687d756c1de6cf621196ea59801bb15fb20eb1f6ef54d872b6dd26f6c2
                                                        • Instruction Fuzzy Hash: C862CC74E052298FDB64CF69C984BDDFBB2AB4A304F1481EAD409A7351EB349E81CF54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 765 30283c9-30283f8 766 30283fa 765->766 767 30283ff-30284c2 call 30266f8 call 3026b88 765->767 766->767 776 30287e0-3028812 767->776 777 30284c8-30284e0 767->777 780 30284e2 777->780 781 30284e7-30284f0 777->781 780->781 782 30287d3-30287d9 781->782 783 30284f5-302856f KiUserExceptionDispatcher 782->783 784 30287df 782->784 788 3028575-30285e3 783->788 789 302862b-3028686 783->789 784->776 798 3028626-3028629 788->798 799 30285e5-3028625 788->799 800 3028687-30286d5 call 30243f8 * 2 789->800 798->800 799->798 807 30286db-30287bd 800->807 808 30287be-30287c9 800->808 807->808 809 30287d0 808->809 810 30287cb 808->810 809->782 810->809
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 0302855B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: a42eadc1321b27d24601b1d857967b71ee415063a6bc546068f07f44b2cfc9ff
                                                        • Instruction ID: f228177386e35d04a2541cbd82e8554144db681a47478f35222aca81f7d30b81
                                                        • Opcode Fuzzy Hash: a42eadc1321b27d24601b1d857967b71ee415063a6bc546068f07f44b2cfc9ff
                                                        • Instruction Fuzzy Hash: A1C1B074E01218CFDB64DFA5D944B9DBBB2FB89304F2080A9D809AB754DB35AE85CF14
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 709 3026111-3026140 710 3026142 709->710 711 3026147-30261f6 KiUserExceptionDispatcher 709->711 710->711 716 30261fe-302620c 711->716 717 3026212-302622a 716->717 718 302652a-302655c 716->718 721 3026231-302623a 717->721 722 302622c 717->722 723 302651d-3026523 721->723 722->721 724 3026529 723->724 725 302623f-30262b9 723->725 724->718 730 3026375-30263d0 725->730 731 30262bf-302632d 725->731 742 30263d1-302641f call 30243f8 * 2 730->742 740 3026370-3026373 731->740 741 302632f-302636f 731->741 740->742 741->740 749 3026425-3026507 742->749 750 3026508-3026513 742->750 749->750 752 3026515 750->752 753 302651a 750->753 752->753 753->723
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 030261EC
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 3d56ff0f101bb06f7b6ab3cc5e9d5c8f299890000d74f34466e25b88eb0ae643
                                                        • Instruction ID: 1ce3ce8a1a550932816ea84de0b539a9f8af76776f52477b5f4662376d0ab8d9
                                                        • Opcode Fuzzy Hash: 3d56ff0f101bb06f7b6ab3cc5e9d5c8f299890000d74f34466e25b88eb0ae643
                                                        • Instruction Fuzzy Hash: FCD1A074E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809A7354DB39AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1004 5b9ef88-5b9efa8 1006 5b9efaa 1004->1006 1007 5b9efaf-5b9f05c KiUserExceptionDispatcher 1004->1007 1006->1007 1012 5b9f064-5b9f072 1007->1012 1013 5b9f078-5b9f08f call 5b92958 1012->1013 1014 5b9f38a-5b9f3bc 1012->1014 1018 5b9f091 1013->1018 1019 5b9f096-5b9f09f 1013->1019 1018->1019 1020 5b9f37d-5b9f383 1019->1020 1021 5b9f389 1020->1021 1022 5b9f0a4-5b9f11a call 5b92ad8 * 3 call 5b92fd8 1020->1022 1021->1014 1031 5b9f120-5b9f18e 1022->1031 1032 5b9f1d6-5b9f230 call 5b92ad8 1022->1032 1042 5b9f1d1-5b9f1d4 1031->1042 1043 5b9f190-5b9f1d0 1031->1043 1044 5b9f231-5b9f27f 1032->1044 1042->1044 1043->1042 1049 5b9f368-5b9f373 1044->1049 1050 5b9f285-5b9f367 1044->1050 1051 5b9f37a 1049->1051 1052 5b9f375 1049->1052 1050->1049 1051->1020 1052->1051
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F053
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 33857b1a7534d867078d1a482a4b86ff91e9c2396ceba40342e02b33bfff2c4b
                                                        • Instruction ID: 63080c36a542c68ce0006f4ce0d0b98d984956a2d3eab120d3c709d3adf4829e
                                                        • Opcode Fuzzy Hash: 33857b1a7534d867078d1a482a4b86ff91e9c2396ceba40342e02b33bfff2c4b
                                                        • Instruction Fuzzy Hash: AFC1A274E00218CFDB24DFA5D944BADBBB2FB89304F2081A9D809AB354DB356D85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1065 5b9f3e0-5b9f400 1066 5b9f402 1065->1066 1067 5b9f407-5b9f4b4 KiUserExceptionDispatcher 1065->1067 1066->1067 1072 5b9f4bc-5b9f4ca 1067->1072 1073 5b9f4d0-5b9f4e7 call 5b92958 1072->1073 1074 5b9f7e2-5b9f814 1072->1074 1078 5b9f4e9 1073->1078 1079 5b9f4ee-5b9f4f7 1073->1079 1078->1079 1080 5b9f7d5-5b9f7db 1079->1080 1081 5b9f4fc-5b9f572 call 5b92ad8 * 3 call 5b92fd8 1080->1081 1082 5b9f7e1 1080->1082 1091 5b9f578-5b9f5e6 1081->1091 1092 5b9f62e-5b9f688 call 5b92ad8 1081->1092 1082->1074 1103 5b9f629-5b9f62c 1091->1103 1104 5b9f5e8-5b9f628 1091->1104 1102 5b9f689-5b9f6d7 1092->1102 1109 5b9f6dd-5b9f7bf 1102->1109 1110 5b9f7c0-5b9f7cb 1102->1110 1103->1102 1104->1103 1109->1110 1112 5b9f7cd 1110->1112 1113 5b9f7d2 1110->1113 1112->1113 1113->1080
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F4AB
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 1e5b2a9917b84e36e8c03bbacaf7e0ac3439f0d97dbc25aaaac11364b6098c46
                                                        • Instruction ID: c75f0d126245dc99d9074cf1275cc6e718f2d7819cbff185e53ec1a6dc8b4102
                                                        • Opcode Fuzzy Hash: 1e5b2a9917b84e36e8c03bbacaf7e0ac3439f0d97dbc25aaaac11364b6098c46
                                                        • Instruction Fuzzy Hash: 89C1B174E01218CFDB24DFA5D944BADBBB2FB89314F2081A9D409AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 944 5b9eb30-5b9eb50 945 5b9eb52 944->945 946 5b9eb57-5b9ec04 KiUserExceptionDispatcher 944->946 945->946 951 5b9ec0c-5b9ec1a 946->951 952 5b9ec20-5b9ec37 call 5b92958 951->952 953 5b9ef32-5b9ef64 951->953 957 5b9ec39 952->957 958 5b9ec3e-5b9ec47 952->958 957->958 959 5b9ef25-5b9ef2b 958->959 960 5b9ec4c-5b9ecc2 call 5b92ad8 * 3 call 5b92fd8 959->960 961 5b9ef31 959->961 970 5b9ecc8-5b9ed36 960->970 971 5b9ed7e-5b9edd8 call 5b92ad8 960->971 961->953 981 5b9ed79-5b9ed7c 970->981 982 5b9ed38-5b9ed78 970->982 983 5b9edd9-5b9ee27 971->983 981->983 982->981 988 5b9ee2d-5b9ef0f 983->988 989 5b9ef10-5b9ef1b 983->989 988->989 991 5b9ef1d 989->991 992 5b9ef22 989->992 991->992 992->959
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9EBFB
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 221030c71b52869c90be44d85ad38d1156c6247a1a0f4afcf8c939d7d75d827c
                                                        • Instruction ID: 45974c5a00da6d750167b139de827d073132a2e1ede492fe11f9ea7c500f94fe
                                                        • Opcode Fuzzy Hash: 221030c71b52869c90be44d85ad38d1156c6247a1a0f4afcf8c939d7d75d827c
                                                        • Instruction Fuzzy Hash: B9C1A174E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB354DB35AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 823 5b9e280-5b9e2a0 824 5b9e2a2 823->824 825 5b9e2a7-5b9e354 KiUserExceptionDispatcher 823->825 824->825 830 5b9e35c-5b9e36a 825->830 831 5b9e370-5b9e387 call 5b92958 830->831 832 5b9e682-5b9e6b4 830->832 836 5b9e389 831->836 837 5b9e38e-5b9e397 831->837 836->837 838 5b9e675-5b9e67b 837->838 839 5b9e39c-5b9e412 call 5b92ad8 * 3 call 5b92fd8 838->839 840 5b9e681 838->840 849 5b9e418-5b9e486 839->849 850 5b9e4ce-5b9e528 call 5b92ad8 839->850 840->832 860 5b9e4c9-5b9e4cc 849->860 861 5b9e488-5b9e4c8 849->861 862 5b9e529-5b9e577 850->862 860->862 861->860 867 5b9e57d-5b9e65f 862->867 868 5b9e660-5b9e66b 862->868 867->868 869 5b9e66d 868->869 870 5b9e672 868->870 869->870 870->838
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9E34B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: fcbbe7616b08de958de4bc41d92a180f5aa64a19b2425d210f4efd040c5312c8
                                                        • Instruction ID: f127dd70a29f578c05f2f71f9c953a564a53b587821633778e2a0c177a955da7
                                                        • Opcode Fuzzy Hash: fcbbe7616b08de958de4bc41d92a180f5aa64a19b2425d210f4efd040c5312c8
                                                        • Instruction Fuzzy Hash: E7C19174E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB354DB35AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 883 5b9e6d8-5b9e6f8 885 5b9e6fa 883->885 886 5b9e6ff-5b9e7ac KiUserExceptionDispatcher 883->886 885->886 891 5b9e7b4-5b9e7c2 886->891 892 5b9e7c8-5b9e7df call 5b92958 891->892 893 5b9eada-5b9eb0c 891->893 897 5b9e7e1 892->897 898 5b9e7e6-5b9e7ef 892->898 897->898 899 5b9eacd-5b9ead3 898->899 900 5b9ead9 899->900 901 5b9e7f4-5b9e86a call 5b92ad8 * 3 call 5b92fd8 899->901 900->893 910 5b9e870-5b9e8de 901->910 911 5b9e926-5b9e980 call 5b92ad8 901->911 921 5b9e921-5b9e924 910->921 922 5b9e8e0-5b9e920 910->922 923 5b9e981-5b9e9cf 911->923 921->923 922->921 928 5b9eab8-5b9eac3 923->928 929 5b9e9d5-5b9eab7 923->929 930 5b9eaca 928->930 931 5b9eac5 928->931 929->928 930->899 931->930
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9E7A3
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 4d2972a79d8b08088f8baf0cb5ac40430b26852851eb18168be51d768ec38b10
                                                        • Instruction ID: 944b5ae8328298b2d29a3e75edb6ab3deba5d124a18047d7fed565baacde5aaa
                                                        • Opcode Fuzzy Hash: 4d2972a79d8b08088f8baf0cb5ac40430b26852851eb18168be51d768ec38b10
                                                        • Instruction Fuzzy Hash: 92C1A174E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB354DB35AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1125 5b9f838-5b9f858 1126 5b9f85a 1125->1126 1127 5b9f85f-5b9f90c KiUserExceptionDispatcher 1125->1127 1126->1127 1132 5b9f914-5b9f922 1127->1132 1133 5b9f928-5b9f93f call 5b92958 1132->1133 1134 5b9fc3a-5b9fc6c 1132->1134 1138 5b9f941 1133->1138 1139 5b9f946-5b9f94f 1133->1139 1138->1139 1140 5b9fc2d-5b9fc33 1139->1140 1141 5b9fc39 1140->1141 1142 5b9f954-5b9f9ca call 5b92ad8 * 3 call 5b92fd8 1140->1142 1141->1134 1151 5b9f9d0-5b9fa3e 1142->1151 1152 5b9fa86-5b9fae0 call 5b92ad8 1142->1152 1162 5b9fa81-5b9fa84 1151->1162 1163 5b9fa40-5b9fa80 1151->1163 1164 5b9fae1-5b9fb2f 1152->1164 1162->1164 1163->1162 1169 5b9fc18-5b9fc23 1164->1169 1170 5b9fb35-5b9fc17 1164->1170 1172 5b9fc2a 1169->1172 1173 5b9fc25 1169->1173 1170->1169 1172->1140 1173->1172
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F903
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 98e8e5b9b57c4fc8d5086b86111457cab41a20de01d1fffe056d6d84b2172b9b
                                                        • Instruction ID: aaab5eba451473bd4ed26bb99d17e4ecc32421d53b4c56678272ba16bec4cfb1
                                                        • Opcode Fuzzy Hash: 98e8e5b9b57c4fc8d5086b86111457cab41a20de01d1fffe056d6d84b2172b9b
                                                        • Instruction Fuzzy Hash: 9DC1C274E00218CFDB24DFA5D944BADBBB2FB89314F2081A9D809AB354DB356E85CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1390 5b9f828-5b9f82a 1391 5b9f82c-5b9f82e 1390->1391 1392 5b9f831-5b9f833 1390->1392 1393 5b9f835-5b9f858 1391->1393 1396 5b9f830 1391->1396 1392->1393 1397 5b9f85a 1393->1397 1398 5b9f85f-5b9f90c KiUserExceptionDispatcher 1393->1398 1396->1392 1397->1398 1403 5b9f914-5b9f922 1398->1403 1404 5b9f928-5b9f93f call 5b92958 1403->1404 1405 5b9fc3a-5b9fc6c 1403->1405 1409 5b9f941 1404->1409 1410 5b9f946-5b9f94f 1404->1410 1409->1410 1411 5b9fc2d-5b9fc33 1410->1411 1412 5b9fc39 1411->1412 1413 5b9f954-5b9f9ca call 5b92ad8 * 3 call 5b92fd8 1411->1413 1412->1405 1422 5b9f9d0-5b9fa3e 1413->1422 1423 5b9fa86-5b9fae0 call 5b92ad8 1413->1423 1433 5b9fa81-5b9fa84 1422->1433 1434 5b9fa40-5b9fa80 1422->1434 1435 5b9fae1-5b9fb2f 1423->1435 1433->1435 1434->1433 1440 5b9fc18-5b9fc23 1435->1440 1441 5b9fb35-5b9fc17 1435->1441 1443 5b9fc2a 1440->1443 1444 5b9fc25 1440->1444 1441->1440 1443->1411 1444->1443
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F903
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: d2bbe6824c862a36d0c862f6c13d08393fa45afad722d57f1f5115d6ff6258b9
                                                        • Instruction ID: c807c6c71714e7057780f5425facd907718fc3c3c91f04c9225e8c31bd3ceadb
                                                        • Opcode Fuzzy Hash: d2bbe6824c862a36d0c862f6c13d08393fa45afad722d57f1f5115d6ff6258b9
                                                        • Instruction Fuzzy Hash: 30410370E05209CBDF18CFAAD9446EEBBB2BF89310F20C17AC415AB258DB355946CF44
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1456 5b9e6c8-5b9e6ca 1457 5b9e6cc-5b9e6ce 1456->1457 1458 5b9e6d1-5b9e6d2 1456->1458 1461 5b9e6d0 1457->1461 1462 5b9e6d5-5b9e6d7 1457->1462 1459 5b9e6d9-5b9e6f8 1458->1459 1460 5b9e6d4 1458->1460 1463 5b9e6fa 1459->1463 1464 5b9e6ff-5b9e7ac KiUserExceptionDispatcher 1459->1464 1460->1462 1461->1458 1462->1459 1463->1464 1469 5b9e7b4-5b9e7c2 1464->1469 1470 5b9e7c8-5b9e7df call 5b92958 1469->1470 1471 5b9eada-5b9eb0c 1469->1471 1475 5b9e7e1 1470->1475 1476 5b9e7e6-5b9e7ef 1470->1476 1475->1476 1477 5b9eacd-5b9ead3 1476->1477 1478 5b9ead9 1477->1478 1479 5b9e7f4-5b9e86a call 5b92ad8 * 3 call 5b92fd8 1477->1479 1478->1471 1488 5b9e870-5b9e8de 1479->1488 1489 5b9e926-5b9e980 call 5b92ad8 1479->1489 1499 5b9e921-5b9e924 1488->1499 1500 5b9e8e0-5b9e920 1488->1500 1501 5b9e981-5b9e9cf 1489->1501 1499->1501 1500->1499 1506 5b9eab8-5b9eac3 1501->1506 1507 5b9e9d5-5b9eab7 1501->1507 1508 5b9eaca 1506->1508 1509 5b9eac5 1506->1509 1507->1506 1508->1477 1509->1508
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9E7A3
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 5b80eb30b654ad1af700bdebb67b1505c9b68cf7bb686adf9ec9a898c4e7ee64
                                                        • Instruction ID: 6d646fa6ba94cce74ffb4fdc7aa0a8221c6b0f4cb2c8dc947e081b66e24a3c9e
                                                        • Opcode Fuzzy Hash: 5b80eb30b654ad1af700bdebb67b1505c9b68cf7bb686adf9ec9a898c4e7ee64
                                                        • Instruction Fuzzy Hash: F641E270E012488BDF18CFAAD9446EDBBB2BF89304F20C179C415AB254DB359946CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1522 5b9ef79-5b9ef7a 1523 5b9ef7c-5b9ef7e 1522->1523 1524 5b9ef81 1522->1524 1525 5b9ef80 1523->1525 1526 5b9ef85-5b9ef87 1523->1526 1527 5b9ef89-5b9efa8 1524->1527 1528 5b9ef82 1524->1528 1525->1524 1526->1527 1530 5b9efaa 1527->1530 1531 5b9efaf-5b9f05c KiUserExceptionDispatcher 1527->1531 1528->1527 1529 5b9ef84 1528->1529 1529->1526 1530->1531 1536 5b9f064-5b9f072 1531->1536 1537 5b9f078-5b9f08f call 5b92958 1536->1537 1538 5b9f38a-5b9f3bc 1536->1538 1542 5b9f091 1537->1542 1543 5b9f096-5b9f09f 1537->1543 1542->1543 1544 5b9f37d-5b9f383 1543->1544 1545 5b9f389 1544->1545 1546 5b9f0a4-5b9f11a call 5b92ad8 * 3 call 5b92fd8 1544->1546 1545->1538 1555 5b9f120-5b9f18e 1546->1555 1556 5b9f1d6-5b9f230 call 5b92ad8 1546->1556 1566 5b9f1d1-5b9f1d4 1555->1566 1567 5b9f190-5b9f1d0 1555->1567 1568 5b9f231-5b9f27f 1556->1568 1566->1568 1567->1566 1573 5b9f368-5b9f373 1568->1573 1574 5b9f285-5b9f367 1568->1574 1575 5b9f37a 1573->1575 1576 5b9f375 1573->1576 1574->1573 1575->1544 1576->1575
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F053
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: b21d7520015ead76e2c6dd7a55b1dbdd1fce03860a1f120ead58750d8afbf5ed
                                                        • Instruction ID: e01a20403f42b650d244362a2d4013466a76c36956048b7509df9c9d9079d114
                                                        • Opcode Fuzzy Hash: b21d7520015ead76e2c6dd7a55b1dbdd1fce03860a1f120ead58750d8afbf5ed
                                                        • Instruction Fuzzy Hash: 2D41F174E052088BEF18CFAAD5446ADBBB2BF89304F24C17AC415AB254EB345946CF40
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9F4AB
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 7d0b8f486340029386f48e51a35a2a147b930f1035f1fe75f8a1e42a5deb3706
                                                        • Instruction ID: 6ec9f81f3a00bbf6c8855185d18c523e31609d2acbf83e5a7004225d492bbfe2
                                                        • Opcode Fuzzy Hash: 7d0b8f486340029386f48e51a35a2a147b930f1035f1fe75f8a1e42a5deb3706
                                                        • Instruction Fuzzy Hash: A641C174E01208CBDF18CFAAD5546EEBBB2BF89300F24D17AC419AB254DB355946CF54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1589 5b9e271-5b9e276 1590 5b9e278-5b9e27b 1589->1590 1591 5b9e27d-5b9e2a0 1589->1591 1590->1591 1593 5b9e2a2 1591->1593 1594 5b9e2a7-5b9e354 KiUserExceptionDispatcher 1591->1594 1593->1594 1599 5b9e35c-5b9e36a 1594->1599 1600 5b9e370-5b9e387 call 5b92958 1599->1600 1601 5b9e682-5b9e6b4 1599->1601 1605 5b9e389 1600->1605 1606 5b9e38e-5b9e397 1600->1606 1605->1606 1607 5b9e675-5b9e67b 1606->1607 1608 5b9e39c-5b9e412 call 5b92ad8 * 3 call 5b92fd8 1607->1608 1609 5b9e681 1607->1609 1618 5b9e418-5b9e486 1608->1618 1619 5b9e4ce-5b9e528 call 5b92ad8 1608->1619 1609->1601 1629 5b9e4c9-5b9e4cc 1618->1629 1630 5b9e488-5b9e4c8 1618->1630 1631 5b9e529-5b9e577 1619->1631 1629->1631 1630->1629 1636 5b9e57d-5b9e65f 1631->1636 1637 5b9e660-5b9e66b 1631->1637 1636->1637 1638 5b9e66d 1637->1638 1639 5b9e672 1637->1639 1638->1639 1639->1607
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9E34B
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 2acf72c088487b7ae0a128dae1a5ae8b194639f9893076a270a27d187da50607
                                                        • Instruction ID: aefcd62901c0cede8c2af869c306b9ed101dc7d582d72610359daf407414686c
                                                        • Opcode Fuzzy Hash: 2acf72c088487b7ae0a128dae1a5ae8b194639f9893076a270a27d187da50607
                                                        • Instruction Fuzzy Hash: 2641D070E052488BDF18CFAAD9446AEBBB2AB89304F24C17AC419BB254DB359946CF44
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05B9EBFB
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 8ae7dcdf0a9352c608e17ddab3b084c2291fb4ab2e7f89c8ad3d0751e7f382f4
                                                        • Instruction ID: fb1454b2df0c50493cb4057db5436959ba589e7e46afa0075301a268743a22f0
                                                        • Opcode Fuzzy Hash: 8ae7dcdf0a9352c608e17ddab3b084c2291fb4ab2e7f89c8ad3d0751e7f382f4
                                                        • Instruction Fuzzy Hash: 9C41E070E016088BEF18CFBAD5546EEBBB2BF89300F24D17AC419AB254DB359946CF44
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0dc617373d6a097e259d8a7f12fcc81c27609eee661d2588ceaab68e5475ad56
                                                        • Instruction ID: d588bf1e8e952b86e5e2f7c5403172727f0d2707c50b5ebb728de5cb56a7d75f
                                                        • Opcode Fuzzy Hash: 0dc617373d6a097e259d8a7f12fcc81c27609eee661d2588ceaab68e5475ad56
                                                        • Instruction Fuzzy Hash: 83124974E01228CFDB14DFA9C9547ADBBB2EF89304F2480A9C809AB351DB359D45CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 31d596c5422eba24463c1af416bf6da80fe56cba2f814329cd2a3ff80d137cd8
                                                        • Instruction ID: 4510821e14478e2c6379aede1fdb56d01c7e72db93cf4eb475f3855a6e2aa2cd
                                                        • Opcode Fuzzy Hash: 31d596c5422eba24463c1af416bf6da80fe56cba2f814329cd2a3ff80d137cd8
                                                        • Instruction Fuzzy Hash: CAE10574E01218CFDB14DFA5D944B9DBBB2FF89304F2480A9D409AB355DB35AA85CF10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1dcd0cfb23695a7e349409eb3b7da0406f09810f3bb31f6f806b81ffa2344207
                                                        • Instruction ID: 59371d2574d1f1456961436c394e7dc958be2bebf84bb9124fa4e4ebc6374f57
                                                        • Opcode Fuzzy Hash: 1dcd0cfb23695a7e349409eb3b7da0406f09810f3bb31f6f806b81ffa2344207
                                                        • Instruction Fuzzy Hash: 41C1CF74E01218CFDB24DFA5D954BADBBB2EF89304F2080A9D809AB354DB359E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dc72f5bb0cbfc551546f5aac8e6b13843d7e94f9b16e3c92051d0248ae9a4995
                                                        • Instruction ID: 2d282c8ea735d4eaf70c1a3058be91a390341c668eaeffaf5c3fe2fae397f4a3
                                                        • Opcode Fuzzy Hash: dc72f5bb0cbfc551546f5aac8e6b13843d7e94f9b16e3c92051d0248ae9a4995
                                                        • Instruction Fuzzy Hash: BFD1C174E01228CFDB24DFA5D944BADBBB2FB89304F2480A9D809AB354DB355E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7d9aff8147a6951fba8a6fcfb107b20115e96c2c96b520e0ba1075dc52829b9
                                                        • Instruction ID: 1a16919c8da484164f5a09f09fd40678741c404bbaee899aeb90ae0348212164
                                                        • Opcode Fuzzy Hash: f7d9aff8147a6951fba8a6fcfb107b20115e96c2c96b520e0ba1075dc52829b9
                                                        • Instruction Fuzzy Hash: 8FC1AE74E01218CFDB24DFA5D954BADBBB2EF89304F2081A9D809AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d7ae82e665f993fe4dcb35b4df225f16ed788ce283ee634cce738f6c5a54bc98
                                                        • Instruction ID: 5c7a5878802b35c91baae9a17fb10ccb2140677750ea0baa43ef50f99d5c698e
                                                        • Opcode Fuzzy Hash: d7ae82e665f993fe4dcb35b4df225f16ed788ce283ee634cce738f6c5a54bc98
                                                        • Instruction Fuzzy Hash: 6FD1CF74E01218CFDB64DFA5D944B9DBBB2FB89304F2080A9D809AB755DB35AE85CF10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: afa67770d0609eb6ad4219511ff762832ced304d31fa49cbb00e15749215e292
                                                        • Instruction ID: 97a49d13d0df713a43bce260c246b051acc1b998716e52396262d93d05783f4f
                                                        • Opcode Fuzzy Hash: afa67770d0609eb6ad4219511ff762832ced304d31fa49cbb00e15749215e292
                                                        • Instruction Fuzzy Hash: 23D1C074E01218CFDB24DFA5D944B9DBBB2FB89304F2480A9D809AB354DB35AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 68efcd6426bcd1378b4d7daae1be5f9a7e0212a6e8a58c94c878944a55df95db
                                                        • Instruction ID: b14cc9792a19b0949599399e32d7222a582203fe808b9b2f227ad470209b313f
                                                        • Opcode Fuzzy Hash: 68efcd6426bcd1378b4d7daae1be5f9a7e0212a6e8a58c94c878944a55df95db
                                                        • Instruction Fuzzy Hash: 96C1BF74E01218CFDB24DFA5D984BADBBB2EB89304F2481A9D809AB354DB355E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e05e92cf5aaedf2fa074e023bcd930e2f45fdb7efc7f0bc471dc2846b3f18133
                                                        • Instruction ID: 797101ad8e81b564e2262c851be90926331a46f55bab7bad19c870e7c47f868d
                                                        • Opcode Fuzzy Hash: e05e92cf5aaedf2fa074e023bcd930e2f45fdb7efc7f0bc471dc2846b3f18133
                                                        • Instruction Fuzzy Hash: E3C1BE74E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB355DB35AE85CF14
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 79c529352f71ec400a9fd83e3f92d7f00c5b93ec93240084657a76e63b753bf3
                                                        • Instruction ID: 08e6cd7d1b2cc4c9902fcd5bc2eca34bce253aa3b154ba5e2ca7fcc05e60fee0
                                                        • Opcode Fuzzy Hash: 79c529352f71ec400a9fd83e3f92d7f00c5b93ec93240084657a76e63b753bf3
                                                        • Instruction Fuzzy Hash: E8A11270A01218CFEB10DFA9C588BDDBBB1FF89304F248269E509AB291DB759984CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a84476966f0e8080f5753e08562038fd94c565514dff942f51ff1350f1e6e82a
                                                        • Instruction ID: 1e12ee7e43214d004031b25711f603db2026049d4904f402834fae4c15c091fe
                                                        • Opcode Fuzzy Hash: a84476966f0e8080f5753e08562038fd94c565514dff942f51ff1350f1e6e82a
                                                        • Instruction Fuzzy Hash: 54A12370E01218CFEB10DFA9C948BDDBBB1FF89304F248269D509AB291DB759984CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c75f9e948cdb0eab96bd4ed12d11e15523ed571eb3f1db3016d81f479a660a95
                                                        • Instruction ID: 23466040b7add0c96f9fa1959a0c74a83bb337b0dcd2e45ab8ef5f0b12fa08e7
                                                        • Opcode Fuzzy Hash: c75f9e948cdb0eab96bd4ed12d11e15523ed571eb3f1db3016d81f479a660a95
                                                        • Instruction Fuzzy Hash: 48911470E01218CFEB10DFA8C588BDDBBB1FF49314F2482A9E409AB291DB759985CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1185 3023450-302345c 1186 30234b6-30234e2 1185->1186 1187 302345e-302347a 1185->1187 1202 30234e7-30234f0 1186->1202 1188 3023481-30234b1 1187->1188 1189 302347c 1187->1189 1188->1186 1189->1188 1204 30234f5-30234f7 1202->1204 1205 30234fc-30235ef KiUserExceptionDispatcher 1204->1205 1239 30235f6 1205->1239 1240 30235fd 1239->1240 1271 30235fe call 5b9e271 1240->1271 1272 30235fe call 5b9e280 1240->1272 1241 3023604 1273 3023605 call 5b9e6d8 1241->1273 1274 3023605 call 5b9e6c8 1241->1274 1242 302360b 1275 302360c call 5b9eb30 1242->1275 1276 302360c call 5b9eb20 1242->1276 1243 3023612 1277 3023613 call 5b9ef79 1243->1277 1278 3023613 call 5b9ef88 1243->1278 1244 3023619 1279 302361a call 5b9f3e0 1244->1279 1280 302361a call 5b9f3d0 1244->1280 1245 3023620 1281 3023621 call 5b9f838 1245->1281 1282 3023621 call 5b9f828 1245->1282 1246 3023627 1247 302362e-30236ac call 302e758 call 302ee28 call 302f280 call 302f6d8 call 302fb30 1246->1247 1266 30236b3 1247->1266 1267 30236ba-30236c1 1266->1267 1269 30236c8-30236f3 1267->1269 1271->1241 1272->1241 1273->1242 1274->1242 1275->1243 1276->1243 1277->1244 1278->1244 1279->1245 1280->1245 1281->1246 1282->1246
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 03023506
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: b18d6c62904bfe55a7a76aadb51aec62eb01178e47367e603181595ba70bfff8
                                                        • Instruction ID: 2591d6e2ffc54107e9bcd84a0424f60acebdd3938f0e1086036fb570618f6383
                                                        • Opcode Fuzzy Hash: b18d6c62904bfe55a7a76aadb51aec62eb01178e47367e603181595ba70bfff8
                                                        • Instruction Fuzzy Hash: 8D917031666243CFC304BB24A2AC4BABF75FF9B753741AC55E01A9981DAB7D148ACF10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1288 3023460-302347a 1289 3023481-30235fd KiUserExceptionDispatcher 1288->1289 1290 302347c 1288->1290 1373 30235fe call 5b9e271 1289->1373 1374 30235fe call 5b9e280 1289->1374 1290->1289 1343 3023604 1375 3023605 call 5b9e6d8 1343->1375 1376 3023605 call 5b9e6c8 1343->1376 1344 302360b 1377 302360c call 5b9eb30 1344->1377 1378 302360c call 5b9eb20 1344->1378 1345 3023612 1379 3023613 call 5b9ef79 1345->1379 1380 3023613 call 5b9ef88 1345->1380 1346 3023619 1381 302361a call 5b9f3e0 1346->1381 1382 302361a call 5b9f3d0 1346->1382 1347 3023620 1383 3023621 call 5b9f838 1347->1383 1384 3023621 call 5b9f828 1347->1384 1348 3023627-30236c1 call 302e758 call 302ee28 call 302f280 call 302f6d8 call 302fb30 1371 30236c8-30236f3 1348->1371 1373->1343 1374->1343 1375->1344 1376->1344 1377->1345 1378->1345 1379->1346 1380->1346 1381->1347 1382->1347 1383->1348 1384->1348
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 03023506
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: dc606f7518012236e6469b2e565d9ea4680694a281066e9784935e8f4efe8a63
                                                        • Instruction ID: 6926e996312fbdc14f4bf13e881b12368d16111b6e58fa747c1e6b1b87d1a291
                                                        • Opcode Fuzzy Hash: dc606f7518012236e6469b2e565d9ea4680694a281066e9784935e8f4efe8a63
                                                        • Instruction Fuzzy Hash: 1C51EF30676342DFC2107B60E6AC93EBFB5FB4F353B82AC10A51E958099B78504ADF60
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.633472090.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_3020000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c7eb657dd93a487a1b408308a5cee1605f67fec33ea92fcc769cf0e1f22a9284
                                                        • Instruction ID: a2878ac0a006bd6db7bda24499fb7576a196c610073b57111b2c35a3b100428c
                                                        • Opcode Fuzzy Hash: c7eb657dd93a487a1b408308a5cee1605f67fec33ea92fcc769cf0e1f22a9284
                                                        • Instruction Fuzzy Hash: E852BB74E01228CFDB64CF69C984BADBBB2BB89304F1081E9D509AB354DB359E85CF54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef7951f33e5622556c0994af687e0060bbe6e163ea9094f59db4c399f5c9fc5f
                                                        • Instruction ID: 87dc53f246257a5ffd484db2a6463a84d559789cfdce41dea6f3da52d387a720
                                                        • Opcode Fuzzy Hash: ef7951f33e5622556c0994af687e0060bbe6e163ea9094f59db4c399f5c9fc5f
                                                        • Instruction Fuzzy Hash: 88C1A174E00218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: acd3d4bfa0f3b050feac9e78cc393dd7ff76445f68e1d544616b13c34a027b0c
                                                        • Instruction ID: 7c1a45e60e10011081fd6b68e0acdfdaae93316a2f79c3a826c0c90adc291b95
                                                        • Opcode Fuzzy Hash: acd3d4bfa0f3b050feac9e78cc393dd7ff76445f68e1d544616b13c34a027b0c
                                                        • Instruction Fuzzy Hash: BEC19074E01218CFDB24DFA5D944BADBBB2FF89304F2081A9D809AB354DB356A85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cdb1f20f1dc80382b87ab269a6a42c2d1bf0f9df31d48bfe7e43c58cb5b232ce
                                                        • Instruction ID: 1c0f1f06d71f8b87660d715aeb06676fbdfaf3f9aa41845ae62c734dd43c22d8
                                                        • Opcode Fuzzy Hash: cdb1f20f1dc80382b87ab269a6a42c2d1bf0f9df31d48bfe7e43c58cb5b232ce
                                                        • Instruction Fuzzy Hash: 91C1B174E01218DFDB24DFA5D944BADBBB2FB89304F2081A9D809AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 628cb6065d3bc8fbc1068ae74f51d50fb942eafd543d83cf2de62271ca370468
                                                        • Instruction ID: f095d79c2a9d578fd4cb4a9081e98c67c7891caa6351f9bfec1275e0668f4303
                                                        • Opcode Fuzzy Hash: 628cb6065d3bc8fbc1068ae74f51d50fb942eafd543d83cf2de62271ca370468
                                                        • Instruction Fuzzy Hash: 80C1A074E01218CFDB28DFA5D944B9DBBB2EF89304F2081A9D809AB354DB356A85CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 138dd9b4ae34687460e5e5288b36ceeec6398bb901835d486bdec556fcefe1bf
                                                        • Instruction ID: 6c4f61c4f36eec33fc90759e2bf119067ad6ced968ecf03671e75f67cd02a738
                                                        • Opcode Fuzzy Hash: 138dd9b4ae34687460e5e5288b36ceeec6398bb901835d486bdec556fcefe1bf
                                                        • Instruction Fuzzy Hash: B3C19174E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce83187a1796a75a3d44df81af9e27fe71142206ef621fe5ea67e71ecf2c557e
                                                        • Instruction ID: ea3e880bde53ba742b8ba1b956ec310d655fe0caab44aade274e25c7835b9945
                                                        • Opcode Fuzzy Hash: ce83187a1796a75a3d44df81af9e27fe71142206ef621fe5ea67e71ecf2c557e
                                                        • Instruction Fuzzy Hash: 56C1A074E01218CFDB28DFA5D944B9DBBB2EF89304F2081A9D809AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93e8c12c97d646d993e1e2d7cc2514a5d114a904327c68c7a15ce1ef3feeec9e
                                                        • Instruction ID: 3ad66be2a7da5d69df5272d16b176dee9cc8c7aefcbd8098fa503ff1b34e5e02
                                                        • Opcode Fuzzy Hash: 93e8c12c97d646d993e1e2d7cc2514a5d114a904327c68c7a15ce1ef3feeec9e
                                                        • Instruction Fuzzy Hash: 99C1A174E00218CFDB28DFA5D954B9DBBB2EB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb349af87b47e50b64917d58f82957cdaa74a1df1c6f26bb32602d770d083227
                                                        • Instruction ID: a915a0c061b93cdd287c432dc07b940f32cd0839c173a2eb966dabdbe0e886d3
                                                        • Opcode Fuzzy Hash: bb349af87b47e50b64917d58f82957cdaa74a1df1c6f26bb32602d770d083227
                                                        • Instruction Fuzzy Hash: F9C1A074E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e08a7cf33a5d20c5149c341986d0d02ed1eb01e45628beccf449df135fd78071
                                                        • Instruction ID: af18e60e0e6ccd9bc138288916294a13273179134a6227193c2d911af010bcc8
                                                        • Opcode Fuzzy Hash: e08a7cf33a5d20c5149c341986d0d02ed1eb01e45628beccf449df135fd78071
                                                        • Instruction Fuzzy Hash: 35C1A174E01218CFDB28DFA5D944BADBBB2FB89304F2081A9D409AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20961a6cd6fd29d56aaceda8f8e72f77c21ed555979934701ec5623a9eba6d04
                                                        • Instruction ID: 4f36068a5ed742767cce94e422d50fe5c6b5502149327fbfcdcf5321cdcf9e51
                                                        • Opcode Fuzzy Hash: 20961a6cd6fd29d56aaceda8f8e72f77c21ed555979934701ec5623a9eba6d04
                                                        • Instruction Fuzzy Hash: 99C1A074E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 753e6dca810319b48aa2806d0a6f2172631fcef6fb50c597ffcecf672224b82c
                                                        • Instruction ID: 521cbe51522c434cde1130563d15105af9af56b7d4bcbbbaada848d7a714b395
                                                        • Opcode Fuzzy Hash: 753e6dca810319b48aa2806d0a6f2172631fcef6fb50c597ffcecf672224b82c
                                                        • Instruction Fuzzy Hash: 2FC1B174E00218CFDB28DFA5D944BADBBB2FB89304F2081A9D809AB354DB356D85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4024e39d701855328df1c9066ff3fd1214f8ca98bead91fb9aab3d3d209173eb
                                                        • Instruction ID: 3a84944268f1ee64eb631a4cf71b4746d9cfb24b4eaaa4c09746ad9cef3c2795
                                                        • Opcode Fuzzy Hash: 4024e39d701855328df1c9066ff3fd1214f8ca98bead91fb9aab3d3d209173eb
                                                        • Instruction Fuzzy Hash: F9C1A274E01218CFDB28DFA5D954BADBBB2FB89304F2081A9D409AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be849f4d74c979414410d9b6d67c725d009338b2d91262aa175598b0aaf461ec
                                                        • Instruction ID: 39068e573a953d9679069ff54f34268cf709c7feabcceb1e898867342f60a085
                                                        • Opcode Fuzzy Hash: be849f4d74c979414410d9b6d67c725d009338b2d91262aa175598b0aaf461ec
                                                        • Instruction Fuzzy Hash: 2EC1A274E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 36398857aa61ca75b43f93d410c8d425964b8d6bbfbc3b86e844f8a39fe5cb3e
                                                        • Instruction ID: 125bbbce76c7825c6f13ee16bcfdb6d4236bac387c1e2e17e6311acd1aee06a3
                                                        • Opcode Fuzzy Hash: 36398857aa61ca75b43f93d410c8d425964b8d6bbfbc3b86e844f8a39fe5cb3e
                                                        • Instruction Fuzzy Hash: 6CC1A174E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20aa5fe8d0a2bd6c142b96db6c92c1ef938237af835d9c69c3ecb57249df97db
                                                        • Instruction ID: 7bfb01c159890ecc71d6452ba2565fad9436a29383dae9cbae37532e4ec885d9
                                                        • Opcode Fuzzy Hash: 20aa5fe8d0a2bd6c142b96db6c92c1ef938237af835d9c69c3ecb57249df97db
                                                        • Instruction Fuzzy Hash: 78C1A174E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fdfbd3a30432c3a95e5e18c2cf13229b4f2cb4f2bff189779ba3537144540473
                                                        • Instruction ID: fe8a268fe40f74a6a1ee956e3f6af2bc834f31ab1f875aa78e4fb0e816685af4
                                                        • Opcode Fuzzy Hash: fdfbd3a30432c3a95e5e18c2cf13229b4f2cb4f2bff189779ba3537144540473
                                                        • Instruction Fuzzy Hash: 51C19F74E01218CFDB28DFA5D944B9DBBB2FF89304F2081A9D809AB354DB356A85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ed992f49f6a3f821176b31d0f158ddee61d47f213c4c966a97d92d514a22a7d4
                                                        • Instruction ID: 6e67f4545f5ae581a148d418b624d8feab5c8ec94e4445541a58e83d6289ed1c
                                                        • Opcode Fuzzy Hash: ed992f49f6a3f821176b31d0f158ddee61d47f213c4c966a97d92d514a22a7d4
                                                        • Instruction Fuzzy Hash: E6C1B274E01218DFDB24DFA5D944BADBBB2FB89304F2081A9D809AB354DB356E85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 875c6381a7ea5fed11f2a6987602bff94c0eb9d55f7f0aa15c31e6535895fac5
                                                        • Instruction ID: 54c61d6b8daa35e1ab56c4c25e1b89577a905f0f089e291b61959355833abdc4
                                                        • Opcode Fuzzy Hash: 875c6381a7ea5fed11f2a6987602bff94c0eb9d55f7f0aa15c31e6535895fac5
                                                        • Instruction Fuzzy Hash: 61C1A174E01218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24d398781568d39954ab1ce3cc51f5aea5ffaac5fce38be01860f9321a7e1b7b
                                                        • Instruction ID: 8c798fce135f7ee096b396247991ebde1757787a6a6107bc8f928754bb6ef45e
                                                        • Opcode Fuzzy Hash: 24d398781568d39954ab1ce3cc51f5aea5ffaac5fce38be01860f9321a7e1b7b
                                                        • Instruction Fuzzy Hash: A0C1A174E01218CFDB28DFA5D944BADBBB2FB89304F2081A9D409AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 207f1cd702e130895b1ad7bbf5451dd06d04fea29193c6ecd8a523128fb6119c
                                                        • Instruction ID: 82cbd78853da889120d45ff1d0012a1be71dbaed5a61083403eb486cebea4e97
                                                        • Opcode Fuzzy Hash: 207f1cd702e130895b1ad7bbf5451dd06d04fea29193c6ecd8a523128fb6119c
                                                        • Instruction Fuzzy Hash: BAC1A274E01218CFDB24DFA5D944B9DBBB2FB89304F2081A9D809AB354DB35AE85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 003bb9fb92b3063c2a136de8cba4d2c5aa4f82e3fd451c77df4ca90b1f2b95d5
                                                        • Instruction ID: 969a8aa5fb91dcce9fc50b68278bc548f374ef186ea213a4e074ced886d3f28c
                                                        • Opcode Fuzzy Hash: 003bb9fb92b3063c2a136de8cba4d2c5aa4f82e3fd451c77df4ca90b1f2b95d5
                                                        • Instruction Fuzzy Hash: CCC1B174E01218CFDB24DFA5D944BADBBB2FB89304F2081A9D809AB354DB356E85CF15
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: caa2af1fa046756041193371acd357434e5ac67df26b34f94bf35e74b150ba9a
                                                        • Instruction ID: 580f7f1954adeae504f0ae28e23e8be52b59bdf4c698b9f3b6dccaec740112ea
                                                        • Opcode Fuzzy Hash: caa2af1fa046756041193371acd357434e5ac67df26b34f94bf35e74b150ba9a
                                                        • Instruction Fuzzy Hash: 16C1B174E00218CFDB28DFA5D944B9DBBB2FB89304F2081A9D809AB354DB356E85CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 43b198947d4c8b201ecdbadbee326808976ce34187a7c0a2d962efe9ddb29408
                                                        • Instruction ID: 1f955202e3a214d7a043d552f6944c1ffec86b512090627cab29abc1595e7451
                                                        • Opcode Fuzzy Hash: 43b198947d4c8b201ecdbadbee326808976ce34187a7c0a2d962efe9ddb29408
                                                        • Instruction Fuzzy Hash: 9CB19274E00218CFDB54DFA9D984A9DBBB2FF89314F2481A9D819AB365DB34AD41CF10
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b70bcf3bf3de0664179eb30feed13d59a99f7597534c477d29074e3791a73e06
                                                        • Instruction ID: b65866639a2e53866acacd5f7e676295d045a2e0f1258076e1b92eb6626e2f2b
                                                        • Opcode Fuzzy Hash: b70bcf3bf3de0664179eb30feed13d59a99f7597534c477d29074e3791a73e06
                                                        • Instruction Fuzzy Hash: 8C518674E04608CFDB08DFAAD584A9DBBF2FF89300F248169D419AB365DB34A942CF55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.634508467.0000000005B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_5b90000_oAE7nqtsNA.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: da3175626daabaaa3cfb2411a65e7f0d6bd148dcc54c915b473b1625d4dfd737
                                                        • Instruction ID: 12311957a9072c659f0d84a2477da72dae2738f55bba8e98bbc35186541471dd
                                                        • Opcode Fuzzy Hash: da3175626daabaaa3cfb2411a65e7f0d6bd148dcc54c915b473b1625d4dfd737
                                                        • Instruction Fuzzy Hash: 5ED05E38D0936C8ACF10DF54D9403EEB772BB82200F0020E5800CB7210C7305E048F46
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%