Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
t40mINaB76.exe

Overview

General Information

Sample Name:t40mINaB76.exe
Analysis ID:652384
MD5:245ec1208ca48e276c460411f78c1709
SHA1:d11e01fe9082690cfedbdd60dcb720dc3cc31b50
SHA256:4f226448711ce98504aa05d3ebdec11f518aa583f58d21b44869912b039a5bb7
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • t40mINaB76.exe (PID: 6564 cmdline: "C:\Users\user\Desktop\t40mINaB76.exe" MD5: 245EC1208CA48E276C460411F78C1709)
    • t40mINaB76.exe (PID: 6256 cmdline: C:\Users\user\Desktop\t40mINaB76.exe MD5: 245EC1208CA48E276C460411F78C1709)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "arinzelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "arinze@valete.buzz"}
SourceRuleDescriptionAuthorStrings
00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x17430:$x1: $%SMTPDV$
        • 0x17446:$x2: $#TheHashHere%&
        • 0x187d8:$x3: %FTPDV$
        • 0x188a0:$x4: $%TelegramDv$
        • 0x14d6d:$x5: KeyLoggerEventArgs
        • 0x15103:$x5: KeyLoggerEventArgs
        • 0x18848:$m1: | Snake Keylogger
        • 0x18900:$m1: | Snake Keylogger
        • 0x18a54:$m1: | Snake Keylogger
        • 0x18b7a:$m1: | Snake Keylogger
        • 0x18cd4:$m1: | Snake Keylogger
        • 0x187fc:$m2: Clipboard Logs ID
        • 0x18a0a:$m2: Screenshot Logs ID
        • 0x18b1e:$m2: keystroke Logs ID
        • 0x18d0a:$m3: SnakePW
        • 0x189e2:$m4: \SnakeKeylogger\
        00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Click to see the 28 entries
          SourceRuleDescriptionAuthorStrings
          3.0.t40mINaB76.exe.400000.6.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b36e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a557:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a99e:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1bb1f:$a5: \Kometa\User Data\Default\Login Data
          3.0.t40mINaB76.exe.400000.6.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            3.0.t40mINaB76.exe.400000.6.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              3.0.t40mINaB76.exe.400000.6.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                3.0.t40mINaB76.exe.400000.6.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 62 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.7132.226.8.16949776802842536 06/26/22-09:32:46.921589
                  SID:2842536
                  Source Port:49776
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: t40mINaB76.exeVirustotal: Detection: 35%Perma Link
                  Source: t40mINaB76.exeReversingLabs: Detection: 53%
                  Source: t40mINaB76.exeJoe Sandbox ML: detected
                  Source: 3.0.t40mINaB76.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.t40mINaB76.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.t40mINaB76.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.t40mINaB76.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.t40mINaB76.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.2.t40mINaB76.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 3.0.t40mINaB76.exe.400000.6.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "arinzelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "arinze@valete.buzz"}
                  Source: t40mINaB76.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: t40mINaB76.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B4F539h3_2_02B4F280
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B47507h3_2_02B47200
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B48687h3_2_02B483C9
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B4FDE9h3_2_02B4FB30
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B47DC7h3_2_02B47B08
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B463D1h3_2_02B46111
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B47967h3_2_02B476A8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B46B10h3_2_02B466F8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B4F991h3_2_02B4F6D8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B4F0E1h3_2_02B4EE28
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B48227h3_2_02B47F68
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B4EC8Ah3_2_02B4E758
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B45F70h3_2_02B45587
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_02B452BC
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_02B44AA8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B46B10h3_2_02B46A3E
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_02B450DB
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 02B46B10h3_2_02B466E8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 063762E1h3_2_06376038
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637FAE1h3_2_0637F838
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 063748D1h3_2_06374628
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637E0A9h3_2_0637DE00
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06373319h3_2_06373070
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06377CF1h3_2_06377A48
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06378149h3_2_06377EA0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06376739h3_2_06376490
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06374D29h3_2_06374A80
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637E529h3_2_0637E280
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 063785A1h3_2_063782F8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06376B91h3_2_063768E8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06375181h3_2_06374ED8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637E981h3_2_0637E6D8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06373771h3_2_063734C8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 063755D9h3_2_06375330
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637EDD9h3_2_0637EB30
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06373BC9h3_2_06373920
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06374021h3_2_06373D78
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 063789F9h3_2_06378750
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06376FE9h3_2_06376D40
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06377441h3_2_06377198
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06375A31h3_2_06375788
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637F231h3_2_0637EF88
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06377899h3_2_063775F0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06375E89h3_2_06375BE0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 0637F689h3_2_0637F3E0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then jmp 06374479h3_2_063741D0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_0637C020
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_0637C00F
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_0637C336

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.7:49776 -> 132.226.8.169:80
                  Source: C:\Users\user\Desktop\t40mINaB76.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\t40mINaB76.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\t40mINaB76.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\t40mINaB76.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: t40mINaB76.exe, 00000003.00000002.618270110.0000000002DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: t40mINaB76.exe, 00000003.00000002.618270110.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000002.618229556.0000000002DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: t40mINaB76.exe, 00000003.00000002.618024955.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: t40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: t40mINaB76.exe, 00000003.00000002.618229556.0000000002DDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4fk0
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: t40mINaB76.exe, 00000003.00000002.618024955.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: t40mINaB76.exe, 00000000.00000003.354043115.00000000056FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: t40mINaB76.exe, 00000000.00000003.352500439.00000000056F3000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353409000.00000000056FA000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353721307.00000000056FA000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353001018.00000000056F7000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.354043115.00000000056FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comily
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: t40mINaB76.exe, 00000000.00000003.351635075.0000000005704000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: t40mINaB76.exe, 00000000.00000003.355217285.000000000570E000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.355125365.000000000570E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlo
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: t40mINaB76.exe, 00000000.00000002.383796685.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
                  Source: t40mINaB76.exe, 00000000.00000002.383796685.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.coma
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: t40mINaB76.exe, 00000000.00000003.351157043.0000000005701000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.351002112.0000000005700000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.357659176.00000000056F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.351452161.0000000005704000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: t40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: t40mINaB76.exeString found in binary or memory: https://picsum.photos/80
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                  System Summary

                  barindex
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: t40mINaB76.exe PID: 6256, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: t40mINaB76.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: t40mINaB76.exe PID: 6256, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_00EAF8820_2_00EAF882
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4F2803_2_02B4F280
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B472003_2_02B47200
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B46B883_2_02B46B88
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B483C93_2_02B483C9
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4FB303_2_02B4FB30
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B47B083_2_02B47B08
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B461113_2_02B46111
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B476A83_2_02B476A8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4F6D83_2_02B4F6D8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4EE283_2_02B4EE28
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B47F683_2_02B47F68
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4E7583_2_02B4E758
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4A45A3_2_02B4A45A
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B455873_2_02B45587
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B44AA83_2_02B44AA8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B44A983_2_02B44A98
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B472483_2_02B47248
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B46B783_2_02B46B78
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4DFE03_2_02B4DFE0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B4DFD03_2_02B4DFD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063760383_2_06376038
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637F8383_2_0637F838
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063746283_2_06374628
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637DE003_2_0637DE00
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063730703_2_06373070
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063700403_2_06370040
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06377A483_2_06377A48
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06377EA03_2_06377EA0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063764903_2_06376490
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637D0983_2_0637D098
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06374A803_2_06374A80
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637E2803_2_0637E280
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063782F83_2_063782F8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063768E83_2_063768E8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06374ED83_2_06374ED8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637E6D83_2_0637E6D8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063734C83_2_063734C8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063753303_2_06375330
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637EB303_2_0637EB30
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063739203_2_06373920
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637B7703_2_0637B770
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06373D783_2_06373D78
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063787503_2_06378750
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06376D403_2_06376D40
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06378BA83_2_06378BA8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063771983_2_06377198
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637C3983_2_0637C398
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063757883_2_06375788
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637EF883_2_0637EF88
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063775F03_2_063775F0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06375BE03_2_06375BE0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637F3E03_2_0637F3E0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063741D03_2_063741D0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06377A3A3_2_06377A3A
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637C0203_2_0637C020
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063760283_2_06376028
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637F8283_2_0637F828
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063746193_2_06374619
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063700063_2_06370006
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637C00F3_2_0637C00F
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06374A703_2_06374A70
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063730623_2_06373062
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063734B83_2_063734B8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06377E903_2_06377E90
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063764823_2_06376482
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063782E83_2_063782E8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063768D83_2_063768D8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637B6C93_2_0637B6C9
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06374EC83_2_06374EC8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637E6C83_2_0637E6C8
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06376D363_2_06376D36
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063753213_2_06375321
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637EB203_2_0637EB20
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063739103_2_06373910
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637EF793_2_0637EF79
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063757783_2_06375778
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06373D683_2_06373D68
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063787413_2_06378741
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063771883_2_06377188
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637DDF03_2_0637DDF0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063775E03_2_063775E0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_06375BD03_2_06375BD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_0637F3D03_2_0637F3D0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_063741C03_2_063741C0
                  Source: t40mINaB76.exeBinary or memory string: OriginalFilename vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.390847193.0000000007170000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.390556341.0000000006F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000000.00000002.390577870.0000000006F30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs t40mINaB76.exe
                  Source: t40mINaB76.exeBinary or memory string: OriginalFilename vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000003.00000000.368971564.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs t40mINaB76.exe
                  Source: t40mINaB76.exe, 00000003.00000002.617356854.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs t40mINaB76.exe
                  Source: t40mINaB76.exeBinary or memory string: OriginalFilenameIMap.exe> vs t40mINaB76.exe
                  Source: t40mINaB76.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: t40mINaB76.exeVirustotal: Detection: 35%
                  Source: t40mINaB76.exeReversingLabs: Detection: 53%
                  Source: t40mINaB76.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\t40mINaB76.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\t40mINaB76.exe "C:\Users\user\Desktop\t40mINaB76.exe"
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess created: C:\Users\user\Desktop\t40mINaB76.exe C:\Users\user\Desktop\t40mINaB76.exe
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess created: C:\Users\user\Desktop\t40mINaB76.exe C:\Users\user\Desktop\t40mINaB76.exeJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\t40mINaB76.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: t40mINaB76.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\t40mINaB76.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: t40mINaB76.exe, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.t40mINaB76.exe.3a0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.t40mINaB76.exe.3a0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.t40mINaB76.exe.9b0000.3.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.t40mINaB76.exe.9b0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, u26ca?u060cufffd?/ufffdK??ufffd.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: t40mINaB76.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: t40mINaB76.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: t40mINaB76.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: t40mINaB76.exe, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.t40mINaB76.exe.3a0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.2.t40mINaB76.exe.3a0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.3.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.0.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.13.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.2.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.11.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.2.t40mINaB76.exe.9b0000.1.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.1.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.7.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 3.0.t40mINaB76.exe.9b0000.5.unpack, B20_Ex05_Din_312526551_Omer_312273493/FormMemoryGameSettings.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1C4A push dword ptr [edx]; retf 0_2_003B1C84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1E44 push dword ptr [edx]; retf 0_2_003B1E84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1C85 push dword ptr [eax]; retf 0_2_003B1C8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1A85 push dword ptr [eax]; retf 0_2_003B1A8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1E85 push dword ptr [eax]; retf 0_2_003B1E8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1ACD push ds; retf 0_2_003B1AD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1CCD push ds; retf 0_2_003B1CD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1ECD push ds; retf 0_2_003B1ED0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1B3E push dword ptr [edx]; retf 0_2_003B1B84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1936 push dword ptr [edx]; retf 0_2_003B1984
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1D4F push dword ptr [edx]; retf 0_2_003B1D84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1F4E push dword ptr [edx]; retf 0_2_003B1F84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1B85 push dword ptr [eax]; retf 0_2_003B1B8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1985 push dword ptr [eax]; retf 0_2_003B198C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1D85 push dword ptr [eax]; retf 0_2_003B1D8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1F85 push dword ptr [eax]; retf 0_2_003B1F8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B19E0 push dword ptr [edx]; retf 0_2_003B1A84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1BCD push ds; retf 0_2_003B1BD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B19CD push ds; retf 0_2_003B19D0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1DCD push ds; retf 0_2_003B1DD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 0_2_003B1FCD push ds; retf 0_2_003B1FD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1C85 push dword ptr [eax]; retf 3_2_009C1C8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1CCD push ds; retf 3_2_009C1CD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1C4A push dword ptr [edx]; retf 3_2_009C1C84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1985 push dword ptr [eax]; retf 3_2_009C198C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1D85 push dword ptr [eax]; retf 3_2_009C1D8C
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1DCD push ds; retf 3_2_009C1DD0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C19CD push ds; retf 3_2_009C19D0
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C19E0 push dword ptr [edx]; retf 3_2_009C1A84
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1936 push dword ptr [edx]; retf 3_2_009C1984
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_009C1D4F push dword ptr [edx]; retf 3_2_009C1D84
                  Source: t40mINaB76.exeStatic PE information: 0xF6D13CCD [Tue Mar 22 04:08:45 2101 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.873493921273272
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTR
                  Source: t40mINaB76.exe, 00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: t40mINaB76.exe, 00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\t40mINaB76.exe TID: 6216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: t40mINaB76.exe, 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeCode function: 3_2_02B46B88 LdrInitializeThunk,3_2_02B46B88
                  Source: C:\Users\user\Desktop\t40mINaB76.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, ufffdudb0audf1au07b8?/?????.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.t40mINaB76.exe.400000.6.unpack, ?ufffdWu02e8ufffd/??Ru07b4?.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, ufffdudb0audf1au07b8?/?????.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.t40mINaB76.exe.400000.10.unpack, ?ufffdWu02e8ufffd/??Ru07b4?.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, ufffdudb0audf1au07b8?/?????.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.t40mINaB76.exe.400000.4.unpack, ?ufffdWu02e8ufffd/??Ru07b4?.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, ufffdudb0audf1au07b8?/?????.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.t40mINaB76.exe.400000.8.unpack, ?ufffdWu02e8ufffd/??Ru07b4?.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, ufffdudb0audf1au07b8?/?????.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 3.0.t40mINaB76.exe.400000.12.unpack, ?ufffdWu02e8ufffd/??Ru07b4?.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: C:\Users\user\Desktop\t40mINaB76.exeMemory written: C:\Users\user\Desktop\t40mINaB76.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeProcess created: C:\Users\user\Desktop\t40mINaB76.exe C:\Users\user\Desktop\t40mINaB76.exeJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Users\user\Desktop\t40mINaB76.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Users\user\Desktop\t40mINaB76.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6256, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\t40mINaB76.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6256, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.t40mINaB76.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.t40mINaB76.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c7aed0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c9d170.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.t40mINaB76.exe.3c162b0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: t40mINaB76.exe PID: 6256, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common3
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  t40mINaB76.exe36%VirustotalBrowse
                  t40mINaB76.exe54%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                  t40mINaB76.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  3.0.t40mINaB76.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.t40mINaB76.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.t40mINaB76.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.t40mINaB76.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.0.t40mINaB76.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  3.2.t40mINaB76.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.carterandcone.como0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.fontbureau.come.coma0%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://checkip.dyndns.org4fk00%Avira URL Cloudsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.carterandcone.comily0%Avira URL Cloudsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://www.fontbureau.comcom0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  a-0019.standard.a-msedge.net
                  204.79.197.222
                  truefalse
                    unknown
                    checkip.dyndns.com
                    132.226.8.169
                    truetrue
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/true
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bThet40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bott40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/frere-jones.htmlot40mINaB76.exe, 00000000.00000003.355217285.000000000570E000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.355125365.000000000570E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comot40mINaB76.exe, 00000000.00000003.351635075.0000000005704000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://checkip.dyndns.orgt40mINaB76.exe, 00000003.00000002.618270110.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000002.618229556.0000000002DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designerst40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comt40mINaB76.exe, 00000000.00000003.354043115.00000000056FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.come.comat40mINaB76.exe, 00000000.00000002.383796685.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comlt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/t40mINaB76.exe, 00000000.00000003.351157043.0000000005701000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.351002112.0000000005700000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cThet40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.357659176.00000000056F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://checkip.dyndns.org4fk0t40mINaB76.exe, 00000003.00000002.618229556.0000000002DDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://fontfabrik.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comilyt40mINaB76.exe, 00000000.00000003.352500439.00000000056F3000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353409000.00000000056FA000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353721307.00000000056FA000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.353001018.00000000056F7000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.354043115.00000000056FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comcomt40mINaB76.exe, 00000000.00000002.383796685.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://checkip.dyndns.org/qt40mINaB76.exe, 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaset40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8t40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://picsum.photos/80t40mINaB76.exefalse
                                                high
                                                http://www.fonts.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://checkip.dyndns.comt40mINaB76.exe, 00000003.00000002.618270110.0000000002DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.urwpp.deDPleaset40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmp, t40mINaB76.exe, 00000000.00000003.351452161.0000000005704000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namet40mINaB76.exe, 00000003.00000002.618024955.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sakkal.comt40mINaB76.exe, 00000000.00000002.389854976.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    132.226.8.169
                                                    checkip.dyndns.comUnited States
                                                    16989UTMEMUStrue
                                                    Joe Sandbox Version:35.0.0 Citrine
                                                    Analysis ID:652384
                                                    Start date and time: 26/06/202209:31:122022-06-26 09:31:12 +02:00
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 11m 16s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Sample file name:t40mINaB76.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:18
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HDC Information:
                                                    • Successful, ratio: 0.3% (good quality ratio 0.2%)
                                                    • Quality average: 61.7%
                                                    • Quality standard deviation: 43.7%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 105
                                                    • Number of non-executed functions: 6
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                    • Excluded domains from analysis (whitelisted): www.bing.com, fp.msedge.net, client.wns.windows.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, b-ring.msedge.net, arc.msn.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, 1.perf.msedge.net, fp-as.azureedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    09:32:30API Interceptor1x Sleep call for process: t40mINaB76.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    132.226.8.169MV CHINALAND.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    Docume001.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    Signed_PO_003485940.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    Qlo3Xd8Xt4.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    09009876543456789000000.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    Ouicbvpfj.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    SecuriteInfo.com.W32.AIDetectNet.01.12429.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    INVOICE AND UPDATTED S O A.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    CTDTOMycoF.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    PO_28001.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    SecuriteInfo.com.W32.AIDetectNet.01.10057.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    PO 326217 326214.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    uc2RxH8hO7.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    mltzDybf15.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    Atpeixzs.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    spetsifikatsioon.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    85rc53QGiJ.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    CHIOS LUCK.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    SecuriteInfo.com.W32.AIDetectNet.01.18120.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    AWB #5331810761doc.pdf.exeGet hashmaliciousBrowse
                                                    • checkip.dyndns.org/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    a-0019.standard.a-msedge.netMV. AVENIR TBN VESSEL DETAILS.docx.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    SecuriteInfo.com.W32.AIDetectNet.01.25492.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    Signed_PO_003485940.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    4Os5JWDs7J.dllGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    texdpEFl8r.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    YI52XpVV6Y.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    Qasim_Haxor.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    #U70b9#U51fb#U5b89#U88c5-#U7eb8#U98de#U673a#U7b80#U4f53#U4e2d#U6587#U8bed#U8a00#U5305.comGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    Ou5tput.exe.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    Fichero_Comprobante125822355MX12152022.htmGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    17.06.2022 cuma.docxGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    jUPHTA73IC.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    w7QV15PTIU.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    SecuriteInfo.com.W32.AIDetectNet.01.2759.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    jsgSQzzt8S.dllGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    TLEsLC17Fy.dllGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    hJKjT75NRB.dllGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    purchase order.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    customs broker_outstandings.jsGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    SecuriteInfo.com.Gen.Variant.Nemesis.8198.16406.exeGet hashmaliciousBrowse
                                                    • 204.79.197.222
                                                    checkip.dyndns.com0OZQi3b0tM.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    ZzO0LX45zz.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    FNK08uYGy6.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    MV CHINALAND.exeGet hashmaliciousBrowse
                                                    • 158.101.44.242
                                                    Import shipment.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    4vQAHpapFz.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                                    • 193.122.6.168
                                                    gD5LFrPtfc.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    aercUUUX2C.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    vSgQo7dqYG.exeGet hashmaliciousBrowse
                                                    • 158.101.44.242
                                                    MV CHINALAND.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                                    • 158.101.44.242
                                                    CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    Import shipment.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    tka30O3OZN.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Docume001.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    ViAKIk7T7X.exeGet hashmaliciousBrowse
                                                    • 193.122.130.0
                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    UTMEMUSImport shipment.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    gD5LFrPtfc.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    MV CHINALAND.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Docume001.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    m5s2c7eaZv.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    F96UcEk8Z9.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Signed_PO_003485940.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    Qlo3Xd8Xt4.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    09009876543456789000000.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    Payment Copy.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    PO_28001.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Payment Copy.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Ouicbvpfj.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    Shipping Documents.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    SecuriteInfo.com.W32.AIDetectNet.01.12429.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    INVOICE AND UPDATTED S O A.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    CTDTOMycoF.exeGet hashmaliciousBrowse
                                                    • 132.226.8.169
                                                    Payment Slip.exeGet hashmaliciousBrowse
                                                    • 132.226.247.73
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\t40mINaB76.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1216
                                                    Entropy (8bit):5.355304211458859
                                                    Encrypted:false
                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.867806102757487
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    File name:t40mINaB76.exe
                                                    File size:886784
                                                    MD5:245ec1208ca48e276c460411f78c1709
                                                    SHA1:d11e01fe9082690cfedbdd60dcb720dc3cc31b50
                                                    SHA256:4f226448711ce98504aa05d3ebdec11f518aa583f58d21b44869912b039a5bb7
                                                    SHA512:e277d541f4db6a4bd4e1609e9633286a2d16661becd4bd65fcdadaea78e8494675ab85b6fe788e97c3da95af9616d03d8513d5710ff7d8eb3ac2d8a466a967d2
                                                    SSDEEP:24576:y/W5X1K/W5kkPRrho0/T5UfjvHkEACW53jJ//0DJD:rp92k19UfDfW53FkV
                                                    TLSH:671523443B1A93E4E8EDE37490495631063BB02ECAD0D56DFADA73CAD596372C823E17
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<................0.................. ........@.. ....................................@................................
                                                    Icon Hash:00828e8e8686b000
                                                    Entrypoint:0x4d9e16
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0xF6D13CCD [Tue Mar 22 04:08:45 2101 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    dec eax
                                                    push edx
                                                    dec eax
                                                    inc ecx
                                                    xor eax, 45373434h
                                                    cmp byte ptr [3534564Eh], dh
                                                    xor eax, 4F373751h
                                                    push esp
                                                    inc ecx
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd9dc40x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x390.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xd9da80x1c.text
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xd7e340xd8000False0.9151159215856481data7.873493921273272IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xda0000x3900x400False0.37890625data2.875317760505998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xdc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountry
                                                    RT_VERSION0xda0580x334data
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    192.168.2.7132.226.8.16949776802842536 06/26/22-09:32:46.921589TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4977680192.168.2.7132.226.8.169
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 26, 2022 09:32:46.652586937 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:32:46.920700073 CEST8049776132.226.8.169192.168.2.7
                                                    Jun 26, 2022 09:32:46.921561956 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:32:46.921588898 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:32:47.190963030 CEST8049776132.226.8.169192.168.2.7
                                                    Jun 26, 2022 09:32:47.191929102 CEST8049776132.226.8.169192.168.2.7
                                                    Jun 26, 2022 09:32:47.335665941 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:33:52.190876007 CEST8049776132.226.8.169192.168.2.7
                                                    Jun 26, 2022 09:33:52.191035986 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:34:27.232836962 CEST4977680192.168.2.7132.226.8.169
                                                    Jun 26, 2022 09:34:27.502173901 CEST8049776132.226.8.169192.168.2.7
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 26, 2022 09:32:46.479516983 CEST5871553192.168.2.78.8.8.8
                                                    Jun 26, 2022 09:32:46.499239922 CEST53587158.8.8.8192.168.2.7
                                                    Jun 26, 2022 09:32:46.580642939 CEST6028053192.168.2.78.8.8.8
                                                    Jun 26, 2022 09:32:46.597374916 CEST53602808.8.8.8192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Jun 26, 2022 09:32:46.479516983 CEST192.168.2.78.8.8.80xdacStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.580642939 CEST192.168.2.78.8.8.80x6274Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Jun 26, 2022 09:32:38.311145067 CEST8.8.8.8192.168.2.70x6bd2No error (0)a-0019.a-msedge.neta-0019.a.dns.azurefd.netCNAME (Canonical name)IN (0x0001)
                                                    Jun 26, 2022 09:32:38.311145067 CEST8.8.8.8192.168.2.70x6bd2No error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)
                                                    Jun 26, 2022 09:32:38.311145067 CEST8.8.8.8192.168.2.70x6bd2No error (0)a-0019.standard.a-msedge.net204.79.197.222A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.499239922 CEST8.8.8.8192.168.2.70xdacNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                    Jun 26, 2022 09:32:46.597374916 CEST8.8.8.8192.168.2.70x6274No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                    • checkip.dyndns.org
                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.749776132.226.8.16980C:\Users\user\Desktop\t40mINaB76.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Jun 26, 2022 09:32:46.921588898 CEST1166OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                    Host: checkip.dyndns.org
                                                    Connection: Keep-Alive
                                                    Jun 26, 2022 09:32:47.191929102 CEST1167INHTTP/1.1 200 OK
                                                    Date: Sun, 26 Jun 2022 07:32:47 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 106
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:09:32:21
                                                    Start date:26/06/2022
                                                    Path:C:\Users\user\Desktop\t40mINaB76.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\t40mINaB76.exe"
                                                    Imagebase:0x3a0000
                                                    File size:886784 bytes
                                                    MD5 hash:245EC1208CA48E276C460411F78C1709
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.384331004.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.384566708.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.388217387.0000000003C16000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low

                                                    Target ID:3
                                                    Start time:09:32:31
                                                    Start date:26/06/2022
                                                    Path:C:\Users\user\Desktop\t40mINaB76.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\t40mINaB76.exe
                                                    Imagebase:0x9b0000
                                                    File size:886784 bytes
                                                    MD5 hash:245EC1208CA48E276C460411F78C1709
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.369389708.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.368941333.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.367162385.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.616880091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000000.367916030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:12.5%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:89
                                                      Total number of Limit Nodes:5
                                                      execution_graph 10421 eab258 DuplicateHandle 10422 eab2ee 10421->10422 10423 eaf558 10424 eaf5c0 CreateWindowExW 10423->10424 10426 eaf67c 10424->10426 10426->10426 10427 ea8c38 10431 ea8d30 10427->10431 10439 ea8d21 10427->10439 10428 ea8c47 10432 ea8d43 10431->10432 10434 ea8d5b 10432->10434 10447 ea8fb8 10432->10447 10451 ea8fa9 10432->10451 10433 ea8d53 10433->10434 10435 ea8f58 GetModuleHandleW 10433->10435 10434->10428 10436 ea8f85 10435->10436 10436->10428 10440 ea8d43 10439->10440 10442 ea8d5b 10440->10442 10445 ea8fb8 LoadLibraryExW 10440->10445 10446 ea8fa9 LoadLibraryExW 10440->10446 10441 ea8d53 10441->10442 10443 ea8f58 GetModuleHandleW 10441->10443 10442->10428 10444 ea8f85 10443->10444 10444->10428 10445->10441 10446->10441 10448 ea8fcc 10447->10448 10450 ea8ff1 10448->10450 10455 ea8800 10448->10455 10450->10433 10452 ea8fcc 10451->10452 10453 ea8800 LoadLibraryExW 10452->10453 10454 ea8ff1 10452->10454 10453->10454 10454->10433 10456 ea9198 LoadLibraryExW 10455->10456 10458 ea9211 10456->10458 10458->10450 10419 eaf7a0 SetWindowLongW 10420 eaf80c 10419->10420 10459 ea3e50 10460 ea3e67 10459->10460 10463 ea39f0 10460->10463 10462 ea3e87 10464 ea39fb 10463->10464 10467 ea3a10 10464->10467 10466 ea3f41 10466->10462 10468 ea3a1b 10467->10468 10471 ea3d0c 10468->10471 10470 ea40ad 10470->10466 10472 ea3d17 10471->10472 10475 ea3d3c 10472->10475 10474 ea4182 10474->10470 10476 ea3d47 10475->10476 10479 ea3d6c 10476->10479 10478 ea4291 10478->10474 10480 ea3d77 10479->10480 10485 ea6320 10480->10485 10482 ea6864 10482->10478 10483 ea663b 10483->10482 10489 eaad59 10483->10489 10486 ea632b 10485->10486 10487 ea77da 10486->10487 10494 ea782b 10486->10494 10487->10483 10491 eaad89 10489->10491 10490 eaadad 10490->10482 10491->10490 10498 eaaf18 10491->10498 10502 eaaf07 10491->10502 10495 ea787b 10494->10495 10496 ea7886 KiUserCallbackDispatcher 10495->10496 10497 ea78b0 10495->10497 10496->10497 10497->10487 10499 eaaf25 10498->10499 10501 eaaf5f 10499->10501 10506 ea99d4 10499->10506 10501->10490 10503 eaaf25 10502->10503 10504 eaaf5f 10503->10504 10505 ea99d4 3 API calls 10503->10505 10504->10490 10505->10504 10507 ea99df 10506->10507 10509 eabc58 10507->10509 10510 eab7f4 10507->10510 10511 eab7ff 10510->10511 10512 ea3d6c 3 API calls 10511->10512 10513 eabcc7 10512->10513 10516 eada75 10513->10516 10517 eabd00 10516->10517 10518 eada8d 10516->10518 10517->10509 10520 eadd90 LoadLibraryExW GetModuleHandleW 10518->10520 10519 eadac6 10520->10519 10521 eab030 GetCurrentProcess 10522 eab0aa GetCurrentThread 10521->10522 10523 eab0a3 10521->10523 10524 eab0e0 10522->10524 10525 eab0e7 GetCurrentProcess 10522->10525 10523->10522 10524->10525 10528 eab11d 10525->10528 10526 eab145 GetCurrentThreadId 10527 eab176 10526->10527 10528->10526
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 986ddcf49df4b206dfec0f7b418662a23c4b302094cdd3d24e49a3fb6332f2fd
                                                      • Instruction ID: ae0b63108820be29a6d3e6bf63dd3d6c363909d002887d54327fbfc800b7e2cd
                                                      • Opcode Fuzzy Hash: 986ddcf49df4b206dfec0f7b418662a23c4b302094cdd3d24e49a3fb6332f2fd
                                                      • Instruction Fuzzy Hash: 3EA18075E003598FCB04DBB0D8549DDBBB6FF8A304F158665E409BF2A5DB34A849CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32 ref: 00EAB090
                                                      • GetCurrentThread.KERNEL32 ref: 00EAB0CD
                                                      • GetCurrentProcess.KERNEL32 ref: 00EAB10A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EAB163
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: Current$ProcessThread
                                                      • String ID:
                                                      • API String ID: 2063062207-0
                                                      • Opcode ID: aeedcd35950e9873e8595d4dd5fa5a06287a1dbbe0d5e35cd9c0a953c2414d35
                                                      • Instruction ID: 4f34acef203b32d749b8980602d7f2669f3062dc25051013d389840cd78dfab8
                                                      • Opcode Fuzzy Hash: aeedcd35950e9873e8595d4dd5fa5a06287a1dbbe0d5e35cd9c0a953c2414d35
                                                      • Instruction Fuzzy Hash: 555154B4D053488FDB10CFAAC9887EEBBF0BF8A314F208459E019B7251C7746845CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 21 eab030-eab0a1 GetCurrentProcess 22 eab0aa-eab0de GetCurrentThread 21->22 23 eab0a3-eab0a9 21->23 24 eab0e0-eab0e6 22->24 25 eab0e7-eab11b GetCurrentProcess 22->25 23->22 24->25 27 eab11d-eab123 25->27 28 eab124-eab13c 25->28 27->28 39 eab13f call eab1e3 28->39 40 eab13f call eab5c3 28->40 41 eab13f call eab5d0 28->41 30 eab145-eab174 GetCurrentThreadId 32 eab17d-eab1df 30->32 33 eab176-eab17c 30->33 33->32 39->30 40->30 41->30
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32 ref: 00EAB090
                                                      • GetCurrentThread.KERNEL32 ref: 00EAB0CD
                                                      • GetCurrentProcess.KERNEL32 ref: 00EAB10A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EAB163
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: Current$ProcessThread
                                                      • String ID:
                                                      • API String ID: 2063062207-0
                                                      • Opcode ID: a266f7ca68e85da8527bbc005107931773f1346da7c7d489d1a6d2d8e21e58d9
                                                      • Instruction ID: 87df4d5541b159247cd86b19f34ebee086f80a82f78f0ce138184d10b16a0410
                                                      • Opcode Fuzzy Hash: a266f7ca68e85da8527bbc005107931773f1346da7c7d489d1a6d2d8e21e58d9
                                                      • Instruction Fuzzy Hash: A45142B4E057488FDB10CFAAD988BAEBBF0BF89308F208459E419B7350C7746844CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 166 ea8d30-ea8d38 167 ea8d43-ea8d45 166->167 168 ea8d3e call ea879c 166->168 169 ea8d5b-ea8d5f 167->169 170 ea8d47 167->170 168->167 171 ea8d73-ea8db4 169->171 172 ea8d61-ea8d6b 169->172 221 ea8d4d call ea8fb8 170->221 222 ea8d4d call ea8fa9 170->222 177 ea8dc1-ea8dcf 171->177 178 ea8db6-ea8dbe 171->178 172->171 173 ea8d53-ea8d55 173->169 174 ea8e90-ea8e98 173->174 183 ea8e9c-ea8f08 174->183 180 ea8df3-ea8df5 177->180 181 ea8dd1-ea8dd6 177->181 178->177 182 ea8df8-ea8dff 180->182 184 ea8dd8-ea8ddf call ea87a8 181->184 185 ea8de1 181->185 186 ea8e0c-ea8e13 182->186 187 ea8e01-ea8e09 182->187 215 ea8f0a-ea8f50 183->215 189 ea8de3-ea8df1 184->189 185->189 191 ea8e20-ea8e29 call ea87b8 186->191 192 ea8e15-ea8e1d 186->192 187->186 189->182 197 ea8e2b-ea8e33 191->197 198 ea8e36-ea8e3b 191->198 192->191 197->198 199 ea8e59-ea8e5d 198->199 200 ea8e3d-ea8e44 198->200 203 ea8e63-ea8e66 199->203 200->199 202 ea8e46-ea8e56 call ea87c8 call ea87d8 200->202 202->199 206 ea8e68-ea8e86 203->206 207 ea8e89-ea8e8f 203->207 206->207 216 ea8f58-ea8f83 GetModuleHandleW 215->216 217 ea8f52-ea8f55 215->217 218 ea8f8c-ea8fa0 216->218 219 ea8f85-ea8f8b 216->219 217->216 219->218 221->173 222->173
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00EA8F76
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: f6ac1616d4ece831390b92639ea8427ccca9a8ec4725a08ea1cc6b1a1f99b2da
                                                      • Instruction ID: 1b2a28ed0b45e82889828f0667de7d072e1950139be8c3c41daa451ffc1d9c88
                                                      • Opcode Fuzzy Hash: f6ac1616d4ece831390b92639ea8427ccca9a8ec4725a08ea1cc6b1a1f99b2da
                                                      • Instruction Fuzzy Hash: 33813670A00B058FDB24DF29D54579ABBF5BF89304F10892AE48AEBA50DB74F805CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 223 eaf54d-eaf5be 224 eaf5c9-eaf5d0 223->224 225 eaf5c0-eaf5c6 223->225 226 eaf5db-eaf613 224->226 227 eaf5d2-eaf5d8 224->227 225->224 228 eaf61b-eaf67a CreateWindowExW 226->228 227->226 229 eaf67c-eaf682 228->229 230 eaf683-eaf6bb 228->230 229->230 234 eaf6c8 230->234 235 eaf6bd-eaf6c0 230->235 236 eaf6c9 234->236 235->234 236->236
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EAF66A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: e15829e632864cb1839683d39513a803bd85d3dc745ccd9c87fe2a46f9ffa40c
                                                      • Instruction ID: 5c6f7256118fd34a8eda21796bce10136cf3f150e21e95323db112e05fe06ffb
                                                      • Opcode Fuzzy Hash: e15829e632864cb1839683d39513a803bd85d3dc745ccd9c87fe2a46f9ffa40c
                                                      • Instruction Fuzzy Hash: 5651C3B1D003499FDB15CFA9C884ADDBFB1BF89314F24822AE415BB250D7749845CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 237 eaf558-eaf5be 238 eaf5c9-eaf5d0 237->238 239 eaf5c0-eaf5c6 237->239 240 eaf5db-eaf67a CreateWindowExW 238->240 241 eaf5d2-eaf5d8 238->241 239->238 243 eaf67c-eaf682 240->243 244 eaf683-eaf6bb 240->244 241->240 243->244 248 eaf6c8 244->248 249 eaf6bd-eaf6c0 244->249 250 eaf6c9 248->250 249->248 250->250
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EAF66A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: b6f9d7b11de08f5b34c58c2eb35d763a63d44872bf8df584b08b9fe5899e2af3
                                                      • Instruction ID: cac23b48090e18a90d213cb4a9ec150e47f91f90c49a970a1ebac0d65bcd62ae
                                                      • Opcode Fuzzy Hash: b6f9d7b11de08f5b34c58c2eb35d763a63d44872bf8df584b08b9fe5899e2af3
                                                      • Instruction Fuzzy Hash: BD41AFB1D103499FDB14CF99C884ADEBBB5BF88314F24862AE819BB250D774A845CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 251 eab253-eab2ec DuplicateHandle 252 eab2ee-eab2f4 251->252 253 eab2f5-eab312 251->253 252->253
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAB2DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 64847f594dd0adabb50c59f272d97699d68241b9e1fded8fe831581b7299a35d
                                                      • Instruction ID: 804eb266a7fbd0434cd0005f6db9a8fb88d60853b250bdcc862fdc22c07d301e
                                                      • Opcode Fuzzy Hash: 64847f594dd0adabb50c59f272d97699d68241b9e1fded8fe831581b7299a35d
                                                      • Instruction Fuzzy Hash: 6F2103B59002499FDB10CFA9D884AEEBFF4FB48324F14801AE954B7310C378A955CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 256 eab258-eab2ec DuplicateHandle 257 eab2ee-eab2f4 256->257 258 eab2f5-eab312 256->258 257->258
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAB2DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: f861fb43e8fe132cc963c2caab39d98497990282ebb00fdf1ffe05e02495cd06
                                                      • Instruction ID: 82ac65aab3dbac6bf2c932aa0c9a90c17fe4a61f8a4900b5d19c8743cd53f1f5
                                                      • Opcode Fuzzy Hash: f861fb43e8fe132cc963c2caab39d98497990282ebb00fdf1ffe05e02495cd06
                                                      • Instruction Fuzzy Hash: 8721E2B59002489FDB10CFAAD984ADEBBF8FB48324F14841AE914B7310D378A954DFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 261 ea9190-ea91d8 262 ea91da-ea91dd 261->262 263 ea91e0-ea920f LoadLibraryExW 261->263 262->263 264 ea9218-ea9235 263->264 265 ea9211-ea9217 263->265 265->264
                                                      APIs
                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EA8FF1,00000800,00000000,00000000), ref: 00EA9202
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: e55324e4902e91fb937be4bb6a67c9b83692d5fecdb8f681aa776417f08ee1b0
                                                      • Instruction ID: 68ccb2c58fcc9236153cde39a4a9c2116b5d1e57245265a0bf36a49377828a37
                                                      • Opcode Fuzzy Hash: e55324e4902e91fb937be4bb6a67c9b83692d5fecdb8f681aa776417f08ee1b0
                                                      • Instruction Fuzzy Hash: 4D2136B6D002498FCB10CFAAD884BDEFBF4AB99314F14852AD415B7201C375A945CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 268 ea8800-ea91d8 270 ea91da-ea91dd 268->270 271 ea91e0-ea920f LoadLibraryExW 268->271 270->271 272 ea9218-ea9235 271->272 273 ea9211-ea9217 271->273 273->272
                                                      APIs
                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EA8FF1,00000800,00000000,00000000), ref: 00EA9202
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 86b056ebff9f7811e896c99cba1443ecc298b6eda3f1162b32db919ce4016c0e
                                                      • Instruction ID: cf24fdb033d0e91da0ef31520f215e15bb8874a8d027e8ee4c492a98c3e8f0e8
                                                      • Opcode Fuzzy Hash: 86b056ebff9f7811e896c99cba1443ecc298b6eda3f1162b32db919ce4016c0e
                                                      • Instruction Fuzzy Hash: 721114B69043499FCB10CF9AD844BDEFBF4EB99314F11842AE519BB200C374A945CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 276 ea782b-ea7884 278 ea78d2-ea78eb 276->278 279 ea7886-ea78ae KiUserCallbackDispatcher 276->279 280 ea78b0-ea78b6 279->280 281 ea78b7-ea78cb 279->281 280->281 281->278
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 00EA789D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 5f2b23161b4c4f731c22006c73992839690debe6f62102809719718bbdfad71a
                                                      • Instruction ID: ce6a47e75c7f6bd7590d32d7ef3eb2d63061164cacb2b62e7fc016b9cffe6fb8
                                                      • Opcode Fuzzy Hash: 5f2b23161b4c4f731c22006c73992839690debe6f62102809719718bbdfad71a
                                                      • Instruction Fuzzy Hash: B611DF75C08398CEDB11CFA5D4443EEBFF4AB4A318F0444AAD495BB282C3789608CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 283 ea8f10-ea8f50 284 ea8f58-ea8f83 GetModuleHandleW 283->284 285 ea8f52-ea8f55 283->285 286 ea8f8c-ea8fa0 284->286 287 ea8f85-ea8f8b 284->287 285->284 287->286
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00EA8F76
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: 45346387cee8dfda1c09f11793f32d9106933e872ac093baad86f83040a5c8f7
                                                      • Instruction ID: 94422f5cc2b555a02adc136722aaf5bf02093ae31adc601717a745a1947b8296
                                                      • Opcode Fuzzy Hash: 45346387cee8dfda1c09f11793f32d9106933e872ac093baad86f83040a5c8f7
                                                      • Instruction Fuzzy Hash: 13111DB6D002498FDB10CF9AC944BDEFBF4EB89324F14852AD829B7200C778A545CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 289 eaf7a0-eaf80a SetWindowLongW 290 eaf80c-eaf812 289->290 291 eaf813-eaf827 289->291 290->291
                                                      APIs
                                                      • SetWindowLongW.USER32(?,?,?), ref: 00EAF7FD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.383646371.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ea0000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: LongWindow
                                                      • String ID:
                                                      • API String ID: 1378638983-0
                                                      • Opcode ID: 6ec29e258ff296bb669c21f3158ae49352414e121f396238d0e5e56c8eddc969
                                                      • Instruction ID: e8fa413e481ec118b0566b96967a110d88bbb1ab2f2532e4505c16c117264c12
                                                      • Opcode Fuzzy Hash: 6ec29e258ff296bb669c21f3158ae49352414e121f396238d0e5e56c8eddc969
                                                      • Instruction Fuzzy Hash: EC1100B59002488FDB10CF99D485BDEBBF8EB88324F20851AE814B7300C378A944CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5f0dd7964e917957858e80ff2baba225c5bf79fd27c97f5972c2d08c2c6c9639
                                                      • Instruction ID: 616e3ee4859bf42968ef07dc3d24395bdf3ac842485a722424183bd637cb324f
                                                      • Opcode Fuzzy Hash: 5f0dd7964e917957858e80ff2baba225c5bf79fd27c97f5972c2d08c2c6c9639
                                                      • Instruction Fuzzy Hash: 00210672604348DFCB05DF90E8C0B6ABF65FB88314F24C669E9055B286C336D856CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 918a178a8a3f76edd0c50cd5d6449c7e8a42f7266c9e5d430eaa2433d3712f50
                                                      • Instruction ID: c49b4cbba3373732bc84a1c2470f996199abd1d9fb72286aab2a68192b79c0cd
                                                      • Opcode Fuzzy Hash: 918a178a8a3f76edd0c50cd5d6449c7e8a42f7266c9e5d430eaa2433d3712f50
                                                      • Instruction Fuzzy Hash: C52148B2504248DFDB01DF44E9C0B2ABF61FB88328F24C569ED050B286C336E805DBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370862383.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a1d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b232ab8069f48e7eebd12d0f9df59b9ce3e9c13f5d2014ed732ece4233899f4
                                                      • Instruction ID: ca0757173e7a9544dcb7aa6e4c7f670d91407f2cb26f813c5128df8b7dde4fa8
                                                      • Opcode Fuzzy Hash: 2b232ab8069f48e7eebd12d0f9df59b9ce3e9c13f5d2014ed732ece4233899f4
                                                      • Instruction Fuzzy Hash: 682129B1604244EFDB05DF14D9C0BA6BBB5FB84314F34CA6DE9095B246C33AD886CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370862383.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a1d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2cae6e5c5eb6e5cb1901820d5caae09759e69acb21c2f03e7ede88af48ec1a94
                                                      • Instruction ID: 6366439df3bbe5690635f2af6c21860b60f3024881b22dcbdcc233a5349fb1ed
                                                      • Opcode Fuzzy Hash: 2cae6e5c5eb6e5cb1901820d5caae09759e69acb21c2f03e7ede88af48ec1a94
                                                      • Instruction Fuzzy Hash: 97210475604244EFCB14DF14D9C0B66BB65FB88318F24C96DE90A4B246C33BD887CA61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370862383.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a1d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ab4ec9fb4fc703ef660470102a53ae072ea080098b435207e1f82c9ee6d73f55
                                                      • Instruction ID: 0e97d39e3de0063a64afc26b04019a0a5fdd0e739a9da588fddfd459061e8e5d
                                                      • Opcode Fuzzy Hash: ab4ec9fb4fc703ef660470102a53ae072ea080098b435207e1f82c9ee6d73f55
                                                      • Instruction Fuzzy Hash: ED2181755093808FCB12CF24D994B55BF71EB4A314F28C5DAD8498B697C33AD84ACB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cde79d6d0e43d49321c99c57a5bfe87544c70e15d7d67dc809fe595ce8a0b83
                                                      • Instruction ID: 817e9c01129cce694c951c95e1ce8b329a42861503a95ed168290cc31c296eb8
                                                      • Opcode Fuzzy Hash: 5cde79d6d0e43d49321c99c57a5bfe87544c70e15d7d67dc809fe595ce8a0b83
                                                      • Instruction Fuzzy Hash: 25219D76504284DFCB16CF50E9C4B56BF71FB88324F24C2A9DC040B696C33AD86ACBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2a9d003929d6dc02cb6594d9b18e81f81af5a06eac6336c657b4c9dac273578b
                                                      • Instruction ID: 39b731ebc3b8fa6317681de3d4ebb3bc0f82822c4d82f3570fa50ebb488e3fb6
                                                      • Opcode Fuzzy Hash: 2a9d003929d6dc02cb6594d9b18e81f81af5a06eac6336c657b4c9dac273578b
                                                      • Instruction Fuzzy Hash: 7D11AF76904284CFCB12CF54E9C4B16BF61FB84324F2486A9DC050B656C336E85ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370862383.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a1d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 725603eaebc9f1d621427d3cb60e09fa8cbd8244e7a14264b829477f2138ecd5
                                                      • Instruction ID: 4813fe9497f21de8df44de62d65321d76e997c11ec01e6bece43d4a5017dafbf
                                                      • Opcode Fuzzy Hash: 725603eaebc9f1d621427d3cb60e09fa8cbd8244e7a14264b829477f2138ecd5
                                                      • Instruction Fuzzy Hash: 65118B75904284DFCB11CF14D5C4B95BBA1FB85324F28C6A9D8494B656C33AD88ACB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 442ad4043e179ced28bcfced3fd44d469e80164feec516b69058706a0aa99238
                                                      • Instruction ID: 40b7279e2d8ff182fee12db4c14f71046582918255b7485ade9c82d2e947ecdc
                                                      • Opcode Fuzzy Hash: 442ad4043e179ced28bcfced3fd44d469e80164feec516b69058706a0aa99238
                                                      • Instruction Fuzzy Hash: D201F7724183889AE7105B65DCC4767FF98EF41338F188419ED085A2C6C37A9844DAB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.370839789.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a0d000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 64b3fbec487a569b3872aa1562e40cfd76ea7353f659fd3498e439ed1553af60
                                                      • Instruction ID: 271d6bb51df80dbb6fab155681525bc3d1fa13a9e069b7e690ca32e076f2dce8
                                                      • Opcode Fuzzy Hash: 64b3fbec487a569b3872aa1562e40cfd76ea7353f659fd3498e439ed1553af60
                                                      • Instruction Fuzzy Hash: E0F062724043889EEB108B15DDC4B63FF98EB42774F18C55AED085F286D3799C44DAB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:17.2%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:40.7%
                                                      Total number of Nodes:334
                                                      Total number of Limit Nodes:57
                                                      execution_graph 16786 2b45587 16787 2b455bf LdrInitializeThunk 16786->16787 16788 2b455ba 16786->16788 16789 2b45653 16787->16789 16788->16787 16790 2b43460 16791 2b4347c 16790->16791 16792 2b43505 KiUserExceptionDispatcher 16791->16792 16880 2b46111 16792->16880 16793 2b43513 16884 2b483c9 16793->16884 16795 2b4353d 16903 63734b8 16795->16903 16909 63734c8 16795->16909 16796 2b43544 16915 6373920 16796->16915 16921 6373910 16796->16921 16797 2b4354b 16927 6373d78 16797->16927 16933 6373d68 16797->16933 16798 2b43552 16939 63741d0 16798->16939 16945 63741c0 16798->16945 16799 2b43559 16951 6374619 16799->16951 16957 6374628 16799->16957 16800 2b43560 16963 6374a70 16800->16963 16969 6374a80 16800->16969 16801 2b43567 16975 6374ed8 16801->16975 16981 6374ec8 16801->16981 16802 2b4356e 16987 6375321 16802->16987 16993 6375330 16802->16993 16803 2b43575 16999 6375778 16803->16999 17005 6375788 16803->17005 16804 2b4357c 17011 6375be0 16804->17011 17017 6375bd0 16804->17017 16805 2b43583 17023 6376038 16805->17023 17029 6376028 16805->17029 16806 2b4358a 17035 6376482 16806->17035 17041 6376490 16806->17041 16807 2b43591 17047 63768e8 16807->17047 17053 63768d8 16807->17053 16808 2b43598 17059 6376d40 16808->17059 17065 6376d36 16808->17065 16809 2b4359f 17071 6377198 16809->17071 17077 6377188 16809->17077 16810 2b435a6 17083 63775e0 16810->17083 17090 63775f0 16810->17090 16811 2b435ad 17096 6377a3a 16811->17096 17102 6377a48 16811->17102 16812 2b435b4 17108 6377ea0 16812->17108 17114 6377e90 16812->17114 16813 2b435bb 17120 63782f8 16813->17120 17126 63782e8 16813->17126 16814 2b435c2 17132 6378741 16814->17132 17138 6378750 16814->17138 16815 2b435f6 17156 637e280 16815->17156 16817 2b4360b 17174 637eb20 16817->17174 17180 637eb30 16817->17180 16818 2b43612 17186 637ef88 16818->17186 17192 637ef79 16818->17192 16819 2b43619 17198 637f3d0 16819->17198 17204 637f3e0 16819->17204 16820 2b43620 17210 637f838 16820->17210 17216 637f828 16820->17216 16821 2b43627 16865 2b435c9 17144 637de00 16865->17144 17150 637ddf0 16865->17150 16881 2b46142 KiUserExceptionDispatcher 16880->16881 16883 2b461fe 16881->16883 16883->16793 16887 2b483fa 16884->16887 16885 2b43536 16891 6373062 16885->16891 16897 6373070 16885->16897 16886 2b48549 KiUserExceptionDispatcher 16886->16887 16887->16885 16887->16886 17222 6372c73 16887->17222 17226 6372ad8 16887->17226 17230 6372aca 16887->17230 16892 6373092 KiUserExceptionDispatcher 16891->16892 16896 637314c 16892->16896 16894 6373471 16894->16795 16895 6372ad8 KiUserExceptionDispatcher 16895->16896 16896->16894 16896->16895 16898 6373092 KiUserExceptionDispatcher 16897->16898 16900 637314c 16898->16900 16901 6373471 16900->16901 16902 6372ad8 KiUserExceptionDispatcher 16900->16902 16901->16795 16902->16900 16904 63734c8 KiUserExceptionDispatcher 16903->16904 16908 63735a4 16904->16908 16906 63738c9 16906->16796 16907 6372ad8 KiUserExceptionDispatcher 16907->16908 16908->16906 16908->16907 16910 63734ea KiUserExceptionDispatcher 16909->16910 16913 63735a4 16910->16913 16912 63738c9 16912->16796 16913->16912 16914 6372ad8 KiUserExceptionDispatcher 16913->16914 16914->16913 16916 6373942 KiUserExceptionDispatcher 16915->16916 16920 63739fc 16916->16920 16918 6373d21 16918->16797 16919 6372ad8 KiUserExceptionDispatcher 16919->16920 16920->16918 16920->16919 16922 6373915 KiUserExceptionDispatcher 16921->16922 16926 63739fc 16922->16926 16924 6373d21 16924->16797 16925 6372ad8 KiUserExceptionDispatcher 16925->16926 16926->16924 16926->16925 16928 6373d9a KiUserExceptionDispatcher 16927->16928 16932 6373e54 16928->16932 16930 6374179 16930->16798 16931 6372ad8 KiUserExceptionDispatcher 16931->16932 16932->16930 16932->16931 16934 6373d78 KiUserExceptionDispatcher 16933->16934 16938 6373e54 16934->16938 16936 6374179 16936->16798 16937 6372ad8 KiUserExceptionDispatcher 16937->16938 16938->16936 16938->16937 16940 63741f2 KiUserExceptionDispatcher 16939->16940 16944 63742ac 16940->16944 16942 63745d1 16942->16799 16943 6372ad8 KiUserExceptionDispatcher 16943->16944 16944->16942 16944->16943 16946 63741f2 KiUserExceptionDispatcher 16945->16946 16950 63742ac 16946->16950 16948 63745d1 16948->16799 16949 6372ad8 KiUserExceptionDispatcher 16949->16950 16950->16948 16950->16949 16952 6374628 KiUserExceptionDispatcher 16951->16952 16956 6374704 16952->16956 16954 6374a29 16954->16800 16955 6372ad8 KiUserExceptionDispatcher 16955->16956 16956->16954 16956->16955 16958 637464a KiUserExceptionDispatcher 16957->16958 16962 6374704 16958->16962 16960 6374a29 16960->16800 16961 6372ad8 KiUserExceptionDispatcher 16961->16962 16962->16960 16962->16961 16964 6374aa2 KiUserExceptionDispatcher 16963->16964 16968 6374b5c 16964->16968 16966 6374e81 16966->16801 16967 6372ad8 KiUserExceptionDispatcher 16967->16968 16968->16966 16968->16967 16970 6374aa2 KiUserExceptionDispatcher 16969->16970 16974 6374b5c 16970->16974 16972 6374e81 16972->16801 16973 6372ad8 KiUserExceptionDispatcher 16973->16974 16974->16972 16974->16973 16976 6374efa KiUserExceptionDispatcher 16975->16976 16980 6374fb4 16976->16980 16978 63752d9 16978->16802 16979 6372ad8 KiUserExceptionDispatcher 16979->16980 16980->16978 16980->16979 16982 6374efa KiUserExceptionDispatcher 16981->16982 16986 6374fb4 16982->16986 16984 63752d9 16984->16802 16985 6372ad8 KiUserExceptionDispatcher 16985->16986 16986->16984 16986->16985 16988 6375352 KiUserExceptionDispatcher 16987->16988 16992 637540c 16988->16992 16990 6375731 16990->16803 16991 6372ad8 KiUserExceptionDispatcher 16991->16992 16992->16990 16992->16991 16994 6375352 KiUserExceptionDispatcher 16993->16994 16997 637540c 16994->16997 16996 6375731 16996->16803 16997->16996 16998 6372ad8 KiUserExceptionDispatcher 16997->16998 16998->16997 17000 6375788 KiUserExceptionDispatcher 16999->17000 17004 6375864 17000->17004 17002 6375b89 17002->16804 17003 6372ad8 KiUserExceptionDispatcher 17003->17004 17004->17002 17004->17003 17006 63757aa KiUserExceptionDispatcher 17005->17006 17010 6375864 17006->17010 17008 6375b89 17008->16804 17009 6372ad8 KiUserExceptionDispatcher 17009->17010 17010->17008 17010->17009 17012 6375c02 KiUserExceptionDispatcher 17011->17012 17016 6375cbc 17012->17016 17014 6375fe1 17014->16805 17015 6372ad8 KiUserExceptionDispatcher 17015->17016 17016->17014 17016->17015 17018 6375be0 KiUserExceptionDispatcher 17017->17018 17022 6375cbc 17018->17022 17020 6375fe1 17020->16805 17021 6372ad8 KiUserExceptionDispatcher 17021->17022 17022->17020 17022->17021 17024 637605a KiUserExceptionDispatcher 17023->17024 17028 6376114 17024->17028 17026 6376439 17026->16806 17027 6372ad8 KiUserExceptionDispatcher 17027->17028 17028->17026 17028->17027 17030 637605a KiUserExceptionDispatcher 17029->17030 17034 6376114 17030->17034 17032 6376439 17032->16806 17033 6372ad8 KiUserExceptionDispatcher 17033->17034 17034->17032 17034->17033 17036 63764b2 KiUserExceptionDispatcher 17035->17036 17040 637656c 17036->17040 17038 6376891 17038->16807 17039 6372ad8 KiUserExceptionDispatcher 17039->17040 17040->17038 17040->17039 17042 63764b2 KiUserExceptionDispatcher 17041->17042 17044 637656c 17042->17044 17045 6376891 17044->17045 17046 6372ad8 KiUserExceptionDispatcher 17044->17046 17045->16807 17046->17044 17048 637690a KiUserExceptionDispatcher 17047->17048 17052 63769c4 17048->17052 17050 6376ce9 17050->16808 17051 6372ad8 KiUserExceptionDispatcher 17051->17052 17052->17050 17052->17051 17054 63768e8 KiUserExceptionDispatcher 17053->17054 17057 63769c4 17054->17057 17056 6376ce9 17056->16808 17057->17056 17058 6372ad8 KiUserExceptionDispatcher 17057->17058 17058->17057 17060 6376d62 KiUserExceptionDispatcher 17059->17060 17064 6376e1c 17060->17064 17062 6377141 17062->16809 17063 6372ad8 KiUserExceptionDispatcher 17063->17064 17064->17062 17064->17063 17066 6376d41 KiUserExceptionDispatcher 17065->17066 17070 6376e1c 17066->17070 17068 6377141 17068->16809 17069 6372ad8 KiUserExceptionDispatcher 17069->17070 17070->17068 17070->17069 17072 63771ba KiUserExceptionDispatcher 17071->17072 17076 6377274 17072->17076 17074 6377599 17074->16810 17075 6372ad8 KiUserExceptionDispatcher 17075->17076 17076->17074 17076->17075 17078 6377198 KiUserExceptionDispatcher 17077->17078 17082 6377274 17078->17082 17080 6377599 17080->16810 17081 6372ad8 KiUserExceptionDispatcher 17081->17082 17082->17080 17082->17081 17084 63775c0 17083->17084 17085 63775ea KiUserExceptionDispatcher 17083->17085 17084->16811 17089 63776cc 17085->17089 17087 63779f1 17087->16811 17088 6372ad8 KiUserExceptionDispatcher 17088->17089 17089->17087 17089->17088 17091 6377612 KiUserExceptionDispatcher 17090->17091 17094 63776cc 17091->17094 17093 63779f1 17093->16811 17094->17093 17095 6372ad8 KiUserExceptionDispatcher 17094->17095 17095->17094 17097 6377a6a KiUserExceptionDispatcher 17096->17097 17101 6377b24 17097->17101 17099 6377e49 17099->16812 17100 6372ad8 KiUserExceptionDispatcher 17100->17101 17101->17099 17101->17100 17103 6377a6a KiUserExceptionDispatcher 17102->17103 17105 6377b24 17103->17105 17106 6377e49 17105->17106 17107 6372ad8 KiUserExceptionDispatcher 17105->17107 17106->16812 17107->17105 17109 6377ec2 KiUserExceptionDispatcher 17108->17109 17113 6377f7c 17109->17113 17111 63782a1 17111->16813 17112 6372ad8 KiUserExceptionDispatcher 17112->17113 17113->17111 17113->17112 17115 6377ea0 KiUserExceptionDispatcher 17114->17115 17119 6377f7c 17115->17119 17117 63782a1 17117->16813 17118 6372ad8 KiUserExceptionDispatcher 17118->17119 17119->17117 17119->17118 17121 637831a KiUserExceptionDispatcher 17120->17121 17125 63783d4 17121->17125 17123 63786f9 17123->16814 17124 6372ad8 KiUserExceptionDispatcher 17124->17125 17125->17123 17125->17124 17127 63782eb KiUserExceptionDispatcher 17126->17127 17131 63783d4 17127->17131 17129 63786f9 17129->16814 17130 6372ad8 KiUserExceptionDispatcher 17130->17131 17131->17129 17131->17130 17133 637874b KiUserExceptionDispatcher 17132->17133 17137 637882c 17133->17137 17135 6378b51 17135->16865 17136 6372ad8 KiUserExceptionDispatcher 17136->17137 17137->17135 17137->17136 17139 6378772 KiUserExceptionDispatcher 17138->17139 17142 637882c 17139->17142 17141 6378b51 17141->16865 17142->17141 17143 6372ad8 KiUserExceptionDispatcher 17142->17143 17143->17142 17145 637de22 KiUserExceptionDispatcher 17144->17145 17149 637dedc 17145->17149 17147 637e201 17147->16815 17148 6372ad8 KiUserExceptionDispatcher 17148->17149 17149->17147 17149->17148 17151 637de22 KiUserExceptionDispatcher 17150->17151 17155 637dedc 17151->17155 17153 637e201 17153->16815 17154 6372ad8 KiUserExceptionDispatcher 17154->17155 17155->17153 17155->17154 17157 637e2a2 KiUserExceptionDispatcher 17156->17157 17160 637e35c 17157->17160 17159 2b43604 17162 637e6d8 17159->17162 17168 637e6c8 17159->17168 17160->17159 17161 6372ad8 KiUserExceptionDispatcher 17160->17161 17161->17160 17163 637e6fa KiUserExceptionDispatcher 17162->17163 17167 637e7b4 17163->17167 17165 637ead9 17165->16817 17166 6372ad8 KiUserExceptionDispatcher 17166->17167 17167->17165 17167->17166 17169 637e6d8 KiUserExceptionDispatcher 17168->17169 17173 637e7b4 17169->17173 17171 637ead9 17171->16817 17172 6372ad8 KiUserExceptionDispatcher 17172->17173 17173->17171 17173->17172 17175 637eb52 KiUserExceptionDispatcher 17174->17175 17179 637ec0c 17175->17179 17177 637ef31 17177->16818 17178 6372ad8 KiUserExceptionDispatcher 17178->17179 17179->17177 17179->17178 17181 637eb52 KiUserExceptionDispatcher 17180->17181 17185 637ec0c 17181->17185 17183 637ef31 17183->16818 17184 6372ad8 KiUserExceptionDispatcher 17184->17185 17185->17183 17185->17184 17187 637efaa KiUserExceptionDispatcher 17186->17187 17191 637f064 17187->17191 17189 637f389 17189->16819 17190 6372ad8 KiUserExceptionDispatcher 17190->17191 17191->17189 17191->17190 17193 637ef88 KiUserExceptionDispatcher 17192->17193 17197 637f064 17193->17197 17195 637f389 17195->16819 17196 6372ad8 KiUserExceptionDispatcher 17196->17197 17197->17195 17197->17196 17199 637f402 KiUserExceptionDispatcher 17198->17199 17203 637f4bc 17199->17203 17201 637f7e1 17201->16820 17202 6372ad8 KiUserExceptionDispatcher 17202->17203 17203->17201 17203->17202 17205 637f402 KiUserExceptionDispatcher 17204->17205 17209 637f4bc 17205->17209 17207 637f7e1 17207->16820 17208 6372ad8 KiUserExceptionDispatcher 17208->17209 17209->17207 17209->17208 17211 637f85a KiUserExceptionDispatcher 17210->17211 17213 637f914 17211->17213 17214 637fc39 17213->17214 17215 6372ad8 KiUserExceptionDispatcher 17213->17215 17214->16821 17215->17213 17217 637f838 KiUserExceptionDispatcher 17216->17217 17220 637f914 17217->17220 17219 637fc39 17219->16821 17220->17219 17221 6372ad8 KiUserExceptionDispatcher 17220->17221 17221->17220 17223 6372b37 17222->17223 17224 6372c1b 17223->17224 17225 6372c2a KiUserExceptionDispatcher 17223->17225 17224->16887 17225->17224 17229 6372aff 17226->17229 17227 6372c2a KiUserExceptionDispatcher 17228 6372c1b 17227->17228 17228->16887 17229->17227 17229->17228 17232 6372ad8 17230->17232 17231 6372c2a KiUserExceptionDispatcher 17233 6372c1b 17231->17233 17232->17231 17232->17233 17233->16887 17234 6372f2c 17235 6372eab 17234->17235 17237 6372dee 17234->17237 17236 6372de1 LdrInitializeThunk 17235->17236 17235->17237 17236->17237

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1142 2b45587-2b455b8 1143 2b455bf-2b4564c LdrInitializeThunk 1142->1143 1144 2b455ba 1142->1144 1145 2b45653-2b4571b 1143->1145 1144->1143 1152 2b45fb4-2b45fd3 1145->1152 1153 2b45720-2b4572c 1152->1153 1154 2b45fd9-2b4600e 1152->1154 1156 2b45733-2b45799 1153->1156 1157 2b4572e 1153->1157 1161 2b457a0-2b4582d 1156->1161 1162 2b4579b 1156->1162 1157->1156 1168 2b4583f-2b45846 1161->1168 1169 2b4582f-2b45836 1161->1169 1162->1161 1172 2b4584d-2b4585a 1168->1172 1173 2b45848 1168->1173 1170 2b4583d 1169->1170 1171 2b45838 1169->1171 1170->1172 1171->1170 1174 2b45861-2b45868 1172->1174 1175 2b4585c 1172->1175 1173->1172 1176 2b4586f-2b458c6 1174->1176 1177 2b4586a 1174->1177 1175->1174 1180 2b458cd-2b458e4 1176->1180 1181 2b458c8 1176->1181 1177->1176 1182 2b458e6-2b458ed 1180->1182 1183 2b458ef-2b458f7 1180->1183 1181->1180 1184 2b458f8-2b45902 1182->1184 1183->1184 1185 2b45904 1184->1185 1186 2b45909-2b45912 1184->1186 1185->1186 1187 2b45f84-2b45f8a 1186->1187 1188 2b45917-2b45923 1187->1188 1189 2b45f90-2b45faa 1187->1189 1190 2b45925 1188->1190 1191 2b4592a-2b4592f 1188->1191 1197 2b45fb1 1189->1197 1198 2b45fac 1189->1198 1190->1191 1192 2b45931-2b4593d 1191->1192 1193 2b45972-2b45974 1191->1193 1195 2b45944-2b45949 1192->1195 1196 2b4593f 1192->1196 1199 2b4597a-2b4598e 1193->1199 1195->1193 1200 2b4594b-2b45958 1195->1200 1196->1195 1197->1152 1198->1197 1201 2b45994-2b459a9 1199->1201 1202 2b45f62-2b45f6f 1199->1202 1203 2b4595f-2b45970 1200->1203 1204 2b4595a 1200->1204 1205 2b459b0-2b45a30 1201->1205 1206 2b459ab 1201->1206 1207 2b45f70-2b45f7a 1202->1207 1203->1199 1204->1203 1214 2b45a32-2b45a58 1205->1214 1215 2b45a5a 1205->1215 1206->1205 1208 2b45f81 1207->1208 1209 2b45f7c 1207->1209 1208->1187 1209->1208 1216 2b45a64-2b45a78 1214->1216 1215->1216 1218 2b45bc1-2b45bc6 1216->1218 1219 2b45a7e-2b45a88 1216->1219 1222 2b45bc8-2b45be8 1218->1222 1223 2b45c2a-2b45c2c 1218->1223 1220 2b45a8f-2b45aa9 1219->1220 1221 2b45a8a 1219->1221 1224 2b45ac0-2b45ac2 1220->1224 1225 2b45aab-2b45ab5 1220->1225 1221->1220 1233 2b45c12 1222->1233 1234 2b45bea-2b45c10 1222->1234 1226 2b45c32-2b45c46 1223->1226 1230 2b45b4c-2b45b58 1224->1230 1228 2b45ab7 1225->1228 1229 2b45abc-2b45abf 1225->1229 1231 2b45f5c-2b45f5d 1226->1231 1232 2b45c4c-2b45c56 1226->1232 1228->1229 1229->1224 1235 2b45b5f-2b45b64 1230->1235 1236 2b45b5a 1230->1236 1239 2b45f5e-2b45f60 1231->1239 1237 2b45c5d-2b45c77 1232->1237 1238 2b45c58 1232->1238 1240 2b45c1c-2b45c28 1233->1240 1234->1240 1241 2b45b66-2b45b73 1235->1241 1242 2b45b8b-2b45b8d 1235->1242 1236->1235 1243 2b45c8e-2b45c9c 1237->1243 1244 2b45c79-2b45c83 1237->1244 1238->1237 1239->1207 1240->1226 1247 2b45b75 1241->1247 1248 2b45b7a-2b45b89 1241->1248 1249 2b45b93-2b45ba1 1242->1249 1245 2b45d2c-2b45d38 1243->1245 1250 2b45c85 1244->1250 1251 2b45c8a-2b45c8d 1244->1251 1252 2b45d3f-2b45d44 1245->1252 1253 2b45d3a 1245->1253 1247->1248 1248->1249 1254 2b45ac7-2b45adc 1249->1254 1255 2b45ba7-2b45bbc 1249->1255 1250->1251 1251->1243 1256 2b45d46-2b45d53 1252->1256 1257 2b45d6b-2b45d6d 1252->1257 1253->1252 1258 2b45ae3-2b45b41 1254->1258 1259 2b45ade 1254->1259 1255->1239 1260 2b45d55 1256->1260 1261 2b45d5a-2b45d69 1256->1261 1262 2b45d73-2b45d87 1257->1262 1275 2b45b43 1258->1275 1276 2b45b48-2b45b4b 1258->1276 1259->1258 1260->1261 1261->1262 1263 2b45ca1-2b45cb9 1262->1263 1264 2b45d8d-2b45df9 call 2b443f8 * 2 1262->1264 1266 2b45cc0-2b45d21 1263->1266 1267 2b45cbb 1263->1267 1278 2b45e02-2b45f58 1264->1278 1279 2b45dfb-2b45dfd 1264->1279 1283 2b45d23 1266->1283 1284 2b45d28-2b45d2b 1266->1284 1267->1266 1275->1276 1276->1230 1280 2b45f59-2b45f5a 1278->1280 1279->1280 1280->1189 1283->1284 1284->1245
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: f3550ec09b9e7f4db890f1964c6e91812329413508e38245b32bb95f00b07a9a
                                                      • Instruction ID: bcf4e46b58ab23272df9a6e7f2a7b5937568ea1d580ecd0bd86b8893d6eb154d
                                                      • Opcode Fuzzy Hash: f3550ec09b9e7f4db890f1964c6e91812329413508e38245b32bb95f00b07a9a
                                                      • Instruction Fuzzy Hash: F462CE74E042288FDB24DF69C884BDDBBB2BB59304F6481EAD508A7355EB349E85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1353 2b483c9-2b483f8 1354 2b483ff-2b484c2 call 2b466f8 call 2b46b88 1353->1354 1355 2b483fa 1353->1355 1364 2b487e0-2b48812 1354->1364 1365 2b484c8-2b484e0 1354->1365 1355->1354 1368 2b484e7-2b484f0 1365->1368 1369 2b484e2 1365->1369 1370 2b487d3-2b487d9 1368->1370 1369->1368 1371 2b484f5-2b48501 1370->1371 1372 2b487df 1370->1372 1411 2b48503 call 6372c73 1371->1411 1412 2b48503 call 6372aca 1371->1412 1413 2b48503 call 6372ad8 1371->1413 1372->1364 1373 2b48509-2b4856f KiUserExceptionDispatcher 1376 2b48575-2b485e3 1373->1376 1377 2b4862b-2b48686 1373->1377 1386 2b485e5-2b48625 1376->1386 1387 2b48626-2b48629 1376->1387 1388 2b48687-2b486d5 call 2b443f8 * 2 1377->1388 1386->1387 1387->1388 1395 2b487be-2b487c9 1388->1395 1396 2b486db-2b487bd 1388->1396 1397 2b487d0 1395->1397 1398 2b487cb 1395->1398 1396->1395 1397->1370 1398->1397 1411->1373 1412->1373 1413->1373
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 02B4855B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 78f77f63d66a30371d8703fe8bdb67e57882ea05092a30a16c4096c177d706c6
                                                      • Instruction ID: d9691c14d37ad859dbce61c2b01b8c99286413dba7e3b70e40762b5535080ff4
                                                      • Opcode Fuzzy Hash: 78f77f63d66a30371d8703fe8bdb67e57882ea05092a30a16c4096c177d706c6
                                                      • Instruction Fuzzy Hash: 98C1A078E00218CFDB14DFA5D984BADBBB2FF89304F2080A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1297 2b46111-2b46140 1298 2b46147-2b4620c KiUserExceptionDispatcher 1297->1298 1299 2b46142 1297->1299 1305 2b46212-2b4622a 1298->1305 1306 2b4652a-2b4655c 1298->1306 1299->1298 1309 2b46231-2b4623a 1305->1309 1310 2b4622c 1305->1310 1311 2b4651d-2b46523 1309->1311 1310->1309 1312 2b4623f-2b462b9 1311->1312 1313 2b46529 1311->1313 1318 2b46375-2b463d0 1312->1318 1319 2b462bf-2b4632d 1312->1319 1313->1306 1330 2b463d1-2b4641f call 2b443f8 * 2 1318->1330 1328 2b46370-2b46373 1319->1328 1329 2b4632f-2b4636f 1319->1329 1328->1330 1329->1328 1337 2b46425-2b46507 1330->1337 1338 2b46508-2b46513 1330->1338 1337->1338 1340 2b46515 1338->1340 1341 2b4651a 1338->1341 1340->1341 1341->1311
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 02B461EC
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: a5fd9eeb333bd26dbe2275176c5c0d50e2796b2a4e3dc4af2e97c595c2ac541f
                                                      • Instruction ID: 5b279cb805ee2297fe7ef6f4f845860236a5592a5062a2fc7b63e3c2320bc3c8
                                                      • Opcode Fuzzy Hash: a5fd9eeb333bd26dbe2275176c5c0d50e2796b2a4e3dc4af2e97c595c2ac541f
                                                      • Instruction Fuzzy Hash: 49D1AF78E00218DFDB24DFA5D984BADBBB2FF89304F2081A9D809A7355DB355A85CF10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06376103
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: ea119a025da7f0fb9c284456e3ef5e643097d15ef3506fb97f48ef0874545c6d
                                                      • Instruction ID: c7e2ed2a36fd00fad7de220c28193b02203cd01bef0725d698b65cf68b85f541
                                                      • Opcode Fuzzy Hash: ea119a025da7f0fb9c284456e3ef5e643097d15ef3506fb97f48ef0874545c6d
                                                      • Instruction Fuzzy Hash: 50C1C274E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F903
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 381f978ace881bd1e47451fab7ece0e1c9ae3d686c9694779d12dd2c99c89fb8
                                                      • Instruction ID: ba6a350bd107cadcd6fc417aca540e6dbb6873801b286c1c801a441e648f0ad3
                                                      • Opcode Fuzzy Hash: 381f978ace881bd1e47451fab7ece0e1c9ae3d686c9694779d12dd2c99c89fb8
                                                      • Instruction Fuzzy Hash: A4C1B274E00218CFDB64DFA5D984BADBBB2FF89304F2081A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1714 6374628-6374648 1715 637464f-63746fc KiUserExceptionDispatcher 1714->1715 1716 637464a 1714->1716 1721 6374704-6374712 1715->1721 1716->1715 1722 6374a2a-6374a5c 1721->1722 1723 6374718-637472f call 6372958 1721->1723 1727 6374736-637473f 1723->1727 1728 6374731 1723->1728 1729 6374a1d-6374a23 1727->1729 1728->1727 1730 6374744-63747ba call 6372ad8 * 3 call 6372fd8 1729->1730 1731 6374a29 1729->1731 1740 6374876-63748d0 call 6372ad8 1730->1740 1741 63747c0-637482e 1730->1741 1731->1722 1753 63748d1-637491f 1740->1753 1751 6374871-6374874 1741->1751 1752 6374830-6374870 1741->1752 1751->1753 1752->1751 1758 6374925-6374a07 1753->1758 1759 6374a08-6374a13 1753->1759 1758->1759 1760 6374a15 1759->1760 1761 6374a1a 1759->1761 1760->1761 1761->1729
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063746F3
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: bfd3bd80a63c2b49b7488d556be5db8a89532c1e9b114e4d220c1e6e7548146e
                                                      • Instruction ID: be924fbed26acf9e12cb1d8a55adc846862aca7b2530c4a1a1fef19b95e03555
                                                      • Opcode Fuzzy Hash: bfd3bd80a63c2b49b7488d556be5db8a89532c1e9b114e4d220c1e6e7548146e
                                                      • Instruction Fuzzy Hash: 3AC1B278E00258CFDB64DFA5D984BADBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637DECB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: dfadc3f5966fb07f4b826a4f63e2c253a040ecafe1fcca194fca38d613fa62e9
                                                      • Instruction ID: 592f5d25c994236de190f1e1e30d6149203df9a9c3fb6ffc1ad3f3cad2edd008
                                                      • Opcode Fuzzy Hash: dfadc3f5966fb07f4b826a4f63e2c253a040ecafe1fcca194fca38d613fa62e9
                                                      • Instruction Fuzzy Hash: 37C1A174E00218CFDB64DFA5D984BADBBB2FF89304F2081A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1414 6373070-6373090 1415 6373097-6373144 KiUserExceptionDispatcher 1414->1415 1416 6373092 1414->1416 1421 637314c-637315a 1415->1421 1416->1415 1422 6373472-63734a4 1421->1422 1423 6373160-6373177 call 6372958 1421->1423 1427 637317e-6373187 1423->1427 1428 6373179 1423->1428 1429 6373465-637346b 1427->1429 1428->1427 1430 6373471 1429->1430 1431 637318c-6373202 call 6372ad8 * 3 call 6372fd8 1429->1431 1430->1422 1440 63732be-6373318 call 6372ad8 1431->1440 1441 6373208-6373276 1431->1441 1453 6373319-6373367 1440->1453 1451 63732b9-63732bc 1441->1451 1452 6373278-63732b8 1441->1452 1451->1453 1452->1451 1458 6373450-637345b 1453->1458 1459 637336d-637344f 1453->1459 1461 6373462 1458->1461 1462 637345d 1458->1462 1459->1458 1461->1429 1462->1461
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637313B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 2ef98cd563952c479be5a43ce1a02c48d678fc6a26a906ffbd5c085d6881f4e9
                                                      • Instruction ID: 7a338b2a1d9de32d41edd243d27c956a4b69f8fc463eee3e9415b362aa9d07b0
                                                      • Opcode Fuzzy Hash: 2ef98cd563952c479be5a43ce1a02c48d678fc6a26a906ffbd5c085d6881f4e9
                                                      • Instruction Fuzzy Hash: 45C1A378E00218CFDB64DFA5D954B9DBBB2FF89304F2080A9D809AB354DB355A85DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377B13
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: aa7d20419a8b3bba7435568cfdec86c950cda24de4e03fd9293f8cc788262677
                                                      • Instruction ID: 3115c0a02c4b318859dc505a8d4b7cb296df635946ff2b5c2ae70886aa183d9d
                                                      • Opcode Fuzzy Hash: aa7d20419a8b3bba7435568cfdec86c950cda24de4e03fd9293f8cc788262677
                                                      • Instruction Fuzzy Hash: 8BC19174E00218CFDB64DFA5D984B9DBBB2AF89304F2080A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377F6B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 3007183c2ce9506a26425d242321c2399a0276460e0b0ed34b0bb4a12f227492
                                                      • Instruction ID: 2c3136b37e0ad768ac56d55b9f548d1e7c5b0c14434e6c34eab55c641e32fbbb
                                                      • Opcode Fuzzy Hash: 3007183c2ce9506a26425d242321c2399a0276460e0b0ed34b0bb4a12f227492
                                                      • Instruction Fuzzy Hash: 05C19374E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637655B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 7d572beb32e5a6bf4b9af3f78e9c6a8f792e009c7ba86da3a0905705183f5ac0
                                                      • Instruction ID: 34fcabadbf8f17aaa8c2e7c999cf37f8e41ecc962ed7d272cd0a8c47340ffc78
                                                      • Opcode Fuzzy Hash: 7d572beb32e5a6bf4b9af3f78e9c6a8f792e009c7ba86da3a0905705183f5ac0
                                                      • Instruction Fuzzy Hash: 1CC1B278E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1774 6374a80-6374aa0 1775 6374aa7-6374b54 KiUserExceptionDispatcher 1774->1775 1776 6374aa2 1774->1776 1781 6374b5c-6374b6a 1775->1781 1776->1775 1782 6374e82-6374eb4 1781->1782 1783 6374b70-6374b87 call 6372958 1781->1783 1787 6374b8e-6374b97 1783->1787 1788 6374b89 1783->1788 1789 6374e75-6374e7b 1787->1789 1788->1787 1790 6374e81 1789->1790 1791 6374b9c-6374c12 call 6372ad8 * 3 call 6372fd8 1789->1791 1790->1782 1800 6374cce-6374d28 call 6372ad8 1791->1800 1801 6374c18-6374c86 1791->1801 1813 6374d29-6374d77 1800->1813 1811 6374cc9-6374ccc 1801->1811 1812 6374c88-6374cc8 1801->1812 1811->1813 1812->1811 1818 6374e60-6374e6b 1813->1818 1819 6374d7d-6374e5f 1813->1819 1820 6374e72 1818->1820 1821 6374e6d 1818->1821 1819->1818 1820->1789 1821->1820
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06374B4B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 8429ad024952900e42427bc7c73059c521f9e29dfc44596dc8d307ba78ab59c9
                                                      • Instruction ID: 535795aed6762748e05058049f18ea17f73d6dfcbf8ff7389a0c649671473ffe
                                                      • Opcode Fuzzy Hash: 8429ad024952900e42427bc7c73059c521f9e29dfc44596dc8d307ba78ab59c9
                                                      • Instruction Fuzzy Hash: 33C1A378E00218CFDB64DFA5D984B9DBBB2FF89304F2081A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637E34B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: f2472c8039aca9970b54098496c987c06eecda2c3ae8ec6caebb20dc296dd221
                                                      • Instruction ID: c7c8e4c5e6d779cf27eee0dbc8e9f56a7556209e060ef522213e4c0f76bee003
                                                      • Opcode Fuzzy Hash: f2472c8039aca9970b54098496c987c06eecda2c3ae8ec6caebb20dc296dd221
                                                      • Instruction Fuzzy Hash: FDC1A174E00218CFDB64DFA5D994BADBBB2FF89304F2081A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063783C3
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 1159791a7f3fb86b3cef32375f2e0739fe00ba6dec7486eda3b3bdd8c5e13ee7
                                                      • Instruction ID: 254e49f0f80f46e7d305b85c8dc942e22a3ce6c656a5d642de713885ff364831
                                                      • Opcode Fuzzy Hash: 1159791a7f3fb86b3cef32375f2e0739fe00ba6dec7486eda3b3bdd8c5e13ee7
                                                      • Instruction Fuzzy Hash: 73C1B374E00218CFDB64DFA5D984BADBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063769B3
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 6b88678215138ff27c7e7bb7cdced9de059b1de5ee98ee751c1b7f2a730e2fab
                                                      • Instruction ID: 9e5a755ea1c3586fea16904b54d3902281834ddabfe9aba065629299e74c216b
                                                      • Opcode Fuzzy Hash: 6b88678215138ff27c7e7bb7cdced9de059b1de5ee98ee751c1b7f2a730e2fab
                                                      • Instruction Fuzzy Hash: 4BC1B274E00218CFDB64DFA5D995BADBBB2FF89304F2080A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637E7A3
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 8bc5bf2f58de24c88bce4e40cb4e5a2ceb561884094325168ffd68eca074f9b3
                                                      • Instruction ID: 325efb0666e491affcfc50e2fce68cac212d0e60e0e074c6df3956544318d668
                                                      • Opcode Fuzzy Hash: 8bc5bf2f58de24c88bce4e40cb4e5a2ceb561884094325168ffd68eca074f9b3
                                                      • Instruction Fuzzy Hash: 3AC1B274E00258CFDB64DFA5D984BADBBB2FF89304F2080A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1834 6374ed8-6374ef8 1835 6374eff-6374fac KiUserExceptionDispatcher 1834->1835 1836 6374efa 1834->1836 1841 6374fb4-6374fc2 1835->1841 1836->1835 1842 63752da-637530c 1841->1842 1843 6374fc8-6374fdf call 6372958 1841->1843 1847 6374fe6-6374fef 1843->1847 1848 6374fe1 1843->1848 1849 63752cd-63752d3 1847->1849 1848->1847 1850 6374ff4-637506a call 6372ad8 * 3 call 6372fd8 1849->1850 1851 63752d9 1849->1851 1860 6375126-6375180 call 6372ad8 1850->1860 1861 6375070-63750de 1850->1861 1851->1842 1873 6375181-63751cf 1860->1873 1871 6375121-6375124 1861->1871 1872 63750e0-6375120 1861->1872 1871->1873 1872->1871 1878 63751d5-63752b7 1873->1878 1879 63752b8-63752c3 1873->1879 1878->1879 1881 63752c5 1879->1881 1882 63752ca 1879->1882 1881->1882 1882->1849
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06374FA3
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 721cc4dcaba80ebec5f3a4359694c129041328b16e7a8229875d169915c48bef
                                                      • Instruction ID: 64679c87249135673475862132dd330b22b5c02c6588c7eb65c4741199e9415b
                                                      • Opcode Fuzzy Hash: 721cc4dcaba80ebec5f3a4359694c129041328b16e7a8229875d169915c48bef
                                                      • Instruction Fuzzy Hash: FBC1A378E00258CFDB64DFA5D984B9DBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1474 63734c8-63734e8 1475 63734ef-637359c KiUserExceptionDispatcher 1474->1475 1476 63734ea 1474->1476 1481 63735a4-63735b2 1475->1481 1476->1475 1482 63738ca-63738fc 1481->1482 1483 63735b8-63735cf call 6372958 1481->1483 1487 63735d6-63735df 1483->1487 1488 63735d1 1483->1488 1489 63738bd-63738c3 1487->1489 1488->1487 1490 63735e4-637365a call 6372ad8 * 3 call 6372fd8 1489->1490 1491 63738c9 1489->1491 1500 6373716-6373770 call 6372ad8 1490->1500 1501 6373660-63736ce 1490->1501 1491->1482 1513 6373771-63737bf 1500->1513 1511 6373711-6373714 1501->1511 1512 63736d0-6373710 1501->1512 1511->1513 1512->1511 1518 63737c5-63738a7 1513->1518 1519 63738a8-63738b3 1513->1519 1518->1519 1520 63738b5 1519->1520 1521 63738ba 1519->1521 1520->1521 1521->1489
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06373593
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 259d6d3075b381d80a10e608dbb51ddd8d792d59467fe1f0ede093f7c6e48d39
                                                      • Instruction ID: c30f29b2d839b756830a409a3aef8d26c6cce6c81efacfd99c7343d17844dc93
                                                      • Opcode Fuzzy Hash: 259d6d3075b381d80a10e608dbb51ddd8d792d59467fe1f0ede093f7c6e48d39
                                                      • Instruction Fuzzy Hash: 32C1B374E00218CFDB64DFA5D984BADBBB2FF89304F2081A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1894 6375330-6375350 1895 6375357-6375404 KiUserExceptionDispatcher 1894->1895 1896 6375352 1894->1896 1901 637540c-637541a 1895->1901 1896->1895 1902 6375732-6375764 1901->1902 1903 6375420-6375437 call 6372958 1901->1903 1907 637543e-6375447 1903->1907 1908 6375439 1903->1908 1909 6375725-637572b 1907->1909 1908->1907 1910 6375731 1909->1910 1911 637544c-63754c2 call 6372ad8 * 3 call 6372fd8 1909->1911 1910->1902 1920 637557e-63755d8 call 6372ad8 1911->1920 1921 63754c8-6375536 1911->1921 1933 63755d9-6375627 1920->1933 1931 6375579-637557c 1921->1931 1932 6375538-6375578 1921->1932 1931->1933 1932->1931 1938 6375710-637571b 1933->1938 1939 637562d-637570f 1933->1939 1940 6375722 1938->1940 1941 637571d 1938->1941 1939->1938 1940->1909 1941->1940
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063753FB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: a3901c9efd6aeb70866a173909c34791c260c9d2db0f6ae0154405b147e3ff07
                                                      • Instruction ID: 6c7f3c17a84da825d05f8fd0d5c409139fcc67eee71043e98505d4cdedb02d17
                                                      • Opcode Fuzzy Hash: a3901c9efd6aeb70866a173909c34791c260c9d2db0f6ae0154405b147e3ff07
                                                      • Instruction Fuzzy Hash: 02C1B278E00258CFDB64DFA5D984BADBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637EBFB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 4cc247a1c9e2cb09dfd20734236c5e41c48f0ae66b6277f09d8044aecf994845
                                                      • Instruction ID: 1f314a9af1bd8dda86f9a7197361d6a7d7a1291ef3cfd08617a2d1c0741b587b
                                                      • Opcode Fuzzy Hash: 4cc247a1c9e2cb09dfd20734236c5e41c48f0ae66b6277f09d8044aecf994845
                                                      • Instruction Fuzzy Hash: 43C1A378E00218CFDB64DFA5D994B9DBBB2FF89304F2081A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1534 6373920-6373940 1535 6373947-63739f4 KiUserExceptionDispatcher 1534->1535 1536 6373942 1534->1536 1541 63739fc-6373a0a 1535->1541 1536->1535 1542 6373d22-6373d54 1541->1542 1543 6373a10-6373a27 call 6372958 1541->1543 1547 6373a2e-6373a37 1543->1547 1548 6373a29 1543->1548 1549 6373d15-6373d1b 1547->1549 1548->1547 1550 6373d21 1549->1550 1551 6373a3c-6373ab2 call 6372ad8 * 3 call 6372fd8 1549->1551 1550->1542 1560 6373b6e-6373bc8 call 6372ad8 1551->1560 1561 6373ab8-6373b26 1551->1561 1573 6373bc9-6373c17 1560->1573 1571 6373b69-6373b6c 1561->1571 1572 6373b28-6373b68 1561->1572 1571->1573 1572->1571 1578 6373d00-6373d0b 1573->1578 1579 6373c1d-6373cff 1573->1579 1580 6373d12 1578->1580 1581 6373d0d 1578->1581 1579->1578 1580->1549 1581->1580
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063739EB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 96e9b5933b4f5521acd2352e91241f35865da0a2241da2e2ebb5e98df4f5161e
                                                      • Instruction ID: 3436439ead5535fecb516397e4db6546a421be4ff621f4043aaa57318624e373
                                                      • Opcode Fuzzy Hash: 96e9b5933b4f5521acd2352e91241f35865da0a2241da2e2ebb5e98df4f5161e
                                                      • Instruction Fuzzy Hash: 69C1A374E00218CFDB64DFA5D954BADBBB2FF89304F2080A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1594 6373d78-6373d98 1595 6373d9f-6373e4c KiUserExceptionDispatcher 1594->1595 1596 6373d9a 1594->1596 1601 6373e54-6373e62 1595->1601 1596->1595 1602 637417a-63741ac 1601->1602 1603 6373e68-6373e7f call 6372958 1601->1603 1607 6373e86-6373e8f 1603->1607 1608 6373e81 1603->1608 1609 637416d-6374173 1607->1609 1608->1607 1610 6373e94-6373f0a call 6372ad8 * 3 call 6372fd8 1609->1610 1611 6374179 1609->1611 1620 6373fc6-6374020 call 6372ad8 1610->1620 1621 6373f10-6373f7e 1610->1621 1611->1602 1633 6374021-637406f 1620->1633 1631 6373fc1-6373fc4 1621->1631 1632 6373f80-6373fc0 1621->1632 1631->1633 1632->1631 1638 6374075-6374157 1633->1638 1639 6374158-6374163 1633->1639 1638->1639 1641 6374165 1639->1641 1642 637416a 1639->1642 1641->1642 1642->1609
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06373E43
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 53aba75381cabaf3c52a711c9645194a359b8ae610b435452baa98ef1f56aa48
                                                      • Instruction ID: 6e262718956ac5f61b736381480f79f4c3442eb212a09dddb0f0b241809aa1f9
                                                      • Opcode Fuzzy Hash: 53aba75381cabaf3c52a711c9645194a359b8ae610b435452baa98ef1f56aa48
                                                      • Instruction Fuzzy Hash: DFC1A278E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637881B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: cddfe94a196e3c03d70d5a2409b28982aaa4aa4dda7e2dbcda394ca3080807a6
                                                      • Instruction ID: e5ecbf6961bcb251f292ab490cacb85b12930f3e72d62725043cac0be5d9e63d
                                                      • Opcode Fuzzy Hash: cddfe94a196e3c03d70d5a2409b28982aaa4aa4dda7e2dbcda394ca3080807a6
                                                      • Instruction Fuzzy Hash: 1EC1A274E00218CFDB64DFA5D994BADBBB2FF89304F2081A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06376E0B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 7836c070fa70e5ee5b5c727301d19dfa50071a7b9663e31af6f0665eb81a8f70
                                                      • Instruction ID: 90fb5fda5f02845d4dd8115ec7ae7296faabb62775e4e2b179cd3ee4ddefcf57
                                                      • Opcode Fuzzy Hash: 7836c070fa70e5ee5b5c727301d19dfa50071a7b9663e31af6f0665eb81a8f70
                                                      • Instruction Fuzzy Hash: E5C1A274E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377263
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: eaac5d2fc120ecaf7b87c375a386a836bc4f948cae990b06e4eed9d3ab9d008b
                                                      • Instruction ID: 7ce6bd41d838ad407b1d1285f6ac4952da4fb3270deeb3b7056414328a15139f
                                                      • Opcode Fuzzy Hash: eaac5d2fc120ecaf7b87c375a386a836bc4f948cae990b06e4eed9d3ab9d008b
                                                      • Instruction Fuzzy Hash: 40C1A274E00258CFDB64DFA5D994BADBBB2FF89304F2080A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F053
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: df48f5d4071991f61cdc11ef4e6a56f80aa4f862379d85b5dbd46af40420d6dd
                                                      • Instruction ID: 083034b600f96887cb02821e8e05cef4786b0e79101ce7a87fe86fa85f691ff0
                                                      • Opcode Fuzzy Hash: df48f5d4071991f61cdc11ef4e6a56f80aa4f862379d85b5dbd46af40420d6dd
                                                      • Instruction Fuzzy Hash: EDC1A378E00218CFDB64DFA5D984B9DBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1954 6375788-63757a8 1955 63757af-637585c KiUserExceptionDispatcher 1954->1955 1956 63757aa 1954->1956 1961 6375864-6375872 1955->1961 1956->1955 1962 6375b8a-6375bbc 1961->1962 1963 6375878-637588f call 6372958 1961->1963 1967 6375896-637589f 1963->1967 1968 6375891 1963->1968 1969 6375b7d-6375b83 1967->1969 1968->1967 1970 63758a4-637591a call 6372ad8 * 3 call 6372fd8 1969->1970 1971 6375b89 1969->1971 1980 63759d6-6375a30 call 6372ad8 1970->1980 1981 6375920-637598e 1970->1981 1971->1962 1993 6375a31-6375a7f 1980->1993 1991 63759d1-63759d4 1981->1991 1992 6375990-63759d0 1981->1992 1991->1993 1992->1991 1998 6375a85-6375b67 1993->1998 1999 6375b68-6375b73 1993->1999 1998->1999 2000 6375b75 1999->2000 2001 6375b7a 1999->2001 2000->2001 2001->1969
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06375853
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: e86b18665a4bdf31cc057cf1c31a587378f94330616856d14cc34fbd88c18663
                                                      • Instruction ID: d7ee10d779d6ceeaeb4f1c5bb198fc69c0e0cc804bc1dafb11872851e4e97629
                                                      • Opcode Fuzzy Hash: e86b18665a4bdf31cc057cf1c31a587378f94330616856d14cc34fbd88c18663
                                                      • Instruction Fuzzy Hash: 7DC1A374E00258CFDB64DFA5D984BADBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063776BB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: d610f3243421bacdbfcb43ef15af88a795cb0212dea73fafbec551ad55d66095
                                                      • Instruction ID: bf4adfb871919012bd88fee8d8ec8c6cee225239b9070bd5881245352550b61d
                                                      • Opcode Fuzzy Hash: d610f3243421bacdbfcb43ef15af88a795cb0212dea73fafbec551ad55d66095
                                                      • Instruction Fuzzy Hash: 6AC1A274E00218CFDB64DFA5D944BADBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06375CAB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: ffcd1fdff51a3f11580fd364afdd82f3baec76cf67bdb4015da585b440f0645a
                                                      • Instruction ID: 7a8ceb3bac690560142987664e4a59067c273202ec46c3075a1025c537cb3129
                                                      • Opcode Fuzzy Hash: ffcd1fdff51a3f11580fd364afdd82f3baec76cf67bdb4015da585b440f0645a
                                                      • Instruction Fuzzy Hash: 51C1A374E00218CFDB64DFA5D994BADBBB2FF89304F2080A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F4AB
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 4be6a489cc517d113d5dea017808cb1906e8a558d774ebd9df0490ff3d2e69db
                                                      • Instruction ID: 3034109d4018d321868c85dfa03e036ea34ce918d426ace5549ed25c1c09b716
                                                      • Opcode Fuzzy Hash: 4be6a489cc517d113d5dea017808cb1906e8a558d774ebd9df0490ff3d2e69db
                                                      • Instruction Fuzzy Hash: 93C1B378E00258CFDB64DFA5D994BADBBB2FF89304F2080A9D409AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1654 63741d0-63741f0 1655 63741f7-63742a4 KiUserExceptionDispatcher 1654->1655 1656 63741f2 1654->1656 1661 63742ac-63742ba 1655->1661 1656->1655 1662 63745d2-6374604 1661->1662 1663 63742c0-63742d7 call 6372958 1661->1663 1667 63742de-63742e7 1663->1667 1668 63742d9 1663->1668 1669 63745c5-63745cb 1667->1669 1668->1667 1670 63745d1 1669->1670 1671 63742ec-6374362 call 6372ad8 * 3 call 6372fd8 1669->1671 1670->1662 1680 637441e-6374478 call 6372ad8 1671->1680 1681 6374368-63743d6 1671->1681 1693 6374479-63744c7 1680->1693 1691 6374419-637441c 1681->1691 1692 63743d8-6374418 1681->1692 1691->1693 1692->1691 1698 63745b0-63745bb 1693->1698 1699 63744cd-63745af 1693->1699 1701 63745c2 1698->1701 1702 63745bd 1698->1702 1699->1698 1701->1669 1702->1701
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637429B
                                                        • Part of subcall function 06372AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: fda9f95d61184e6984259ceaa3558ae192622519ee1967d8f75816eeaf9b1605
                                                      • Instruction ID: f46dfe92f3d646bb039ce8fdf330d5cf3eef09853e2958d85edc5cb71c3c5ab6
                                                      • Opcode Fuzzy Hash: fda9f95d61184e6984259ceaa3558ae192622519ee1967d8f75816eeaf9b1605
                                                      • Instruction Fuzzy Hash: 2CC1A378E00218CFDB64DFA5D984B9DBBB2FF89304F2081A9D409AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: D08l
                                                      • API String ID: 0-1120035950
                                                      • Opcode ID: ed7f2f6a119aaa9c705911edf4f2bd5d98a5794ee3aa004d37106c38dc579f66
                                                      • Instruction ID: 01919f14f290e45d9279fbaf9d68f4ef01b665628f4f02d420c47c07db421a03
                                                      • Opcode Fuzzy Hash: ed7f2f6a119aaa9c705911edf4f2bd5d98a5794ee3aa004d37106c38dc579f66
                                                      • Instruction Fuzzy Hash: 4F123574E042188FDB24DFA4C8947ADBBB2FF89304F2081AAD509AB395DB359D45CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063776BB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: f6f8a1a137cce334b0c309dd9b65772f2163b13cb784c9d02dbee619bc1bcd15
                                                      • Instruction ID: 6aa11de0d54f3b317d23b4e6b7a4395b88d586bb81991e91d495ee6af51c18e7
                                                      • Opcode Fuzzy Hash: f6f8a1a137cce334b0c309dd9b65772f2163b13cb784c9d02dbee619bc1bcd15
                                                      • Instruction Fuzzy Hash: 33415975E05288CFDB15CFBAD8406DDBBB2EF8A304F24C16AC418AB255DB39590ACF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063783C3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 460ef86c1d9717ae19094defbe4c406164ab538374066f97e77ecc2e5a3b87b9
                                                      • Instruction ID: 71c53c2b54c93290f68e745704bf45dfc0d093f28db1a041afdda1b3551f1908
                                                      • Opcode Fuzzy Hash: 460ef86c1d9717ae19094defbe4c406164ab538374066f97e77ecc2e5a3b87b9
                                                      • Instruction Fuzzy Hash: AC41E474E00248DBEB58DFAAC8446EEFBB2AF89304F24D13AC415BB254DB385946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06373E43
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 3ae749a861680b76dedb03695c53e88511335c108e3f1c80270d823a0478b110
                                                      • Instruction ID: dae786bb209d51029d9781b09f22b636ac97f49561918cd69905e4dd7d6df109
                                                      • Opcode Fuzzy Hash: 3ae749a861680b76dedb03695c53e88511335c108e3f1c80270d823a0478b110
                                                      • Instruction Fuzzy Hash: E641F374E012088BEB58DFAAD8446DEFBF2EF89304F24D12AC418BB255DB395906CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F903
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 3187b002b9768daa9684186a0cbac1f516c06b322beeadee7748b97faefafe15
                                                      • Instruction ID: 3189b169f92975d30bdc0ead13cd3b11e326e7a1d6ea57c619e4d52f90482650
                                                      • Opcode Fuzzy Hash: 3187b002b9768daa9684186a0cbac1f516c06b322beeadee7748b97faefafe15
                                                      • Instruction Fuzzy Hash: D341E570E01248DBDB58DFAAD8946EEFBB2BF89304F20C12AC414AB354DB395906CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06373593
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 08118a225aaa0756a1a03a0a64dc57788d556c0af302a817f8d0b0f962de3517
                                                      • Instruction ID: d85e57ee9f0c957ccf5886ea000b1b68542e4664562405931776626409904333
                                                      • Opcode Fuzzy Hash: 08118a225aaa0756a1a03a0a64dc57788d556c0af302a817f8d0b0f962de3517
                                                      • Instruction Fuzzy Hash: 5E41D274E01248DBEB58DFAAD9446DEFBB2AF89304F24C12AC414BB254DB395946CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377F6B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: b0d9ec1ae534dfa657a7db9a7370eddb6d246c46e9a7aad21597d7e0a493e966
                                                      • Instruction ID: c50d3a7bf9d094a0809a9ea60497206faf31386d5843f89aa540f6ec7280f509
                                                      • Opcode Fuzzy Hash: b0d9ec1ae534dfa657a7db9a7370eddb6d246c46e9a7aad21597d7e0a493e966
                                                      • Instruction Fuzzy Hash: 0A41D574E002088BDB58DFA6D9846DEFBF2AF89300F20C12AC418BB358DB395906CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063769B3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 0e1afaf5eacd80bf64631b4344aac2383c3383db8757b177cdf614c9d4120cb0
                                                      • Instruction ID: 2b3a5980e2d0e7c9fd7e4b1ff0b9d0d9ab2651a1b40e9e041f5bfab57510cc7f
                                                      • Opcode Fuzzy Hash: 0e1afaf5eacd80bf64631b4344aac2383c3383db8757b177cdf614c9d4120cb0
                                                      • Instruction Fuzzy Hash: 5741F370E00608CBDB58DFAAD8556DEFBB2EF89300F24C12AC418BB658DB385946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637E7A3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 6d93a9b7fc0622abae85765fa193940a8096806fe369fb6058fe41d2b11e49b5
                                                      • Instruction ID: 403a1b2d6d8ecfbb6746832380ae24bd60f7009c8f2795a3e8fc976b8359dfd1
                                                      • Opcode Fuzzy Hash: 6d93a9b7fc0622abae85765fa193940a8096806fe369fb6058fe41d2b11e49b5
                                                      • Instruction Fuzzy Hash: 3541D274E052488BDB58DFAAD8946DEFBB2EF89300F24C16AC414BB354DB39594ACF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F053
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: c55008aa5c3f91e9e43001bc1849fd373531e9d7cc4444b33f9fe55e6725df89
                                                      • Instruction ID: 77510cd5840f4ff1418a2b7fb168f678e3b8cc9b16b5d38fbc8b27b8c899a015
                                                      • Opcode Fuzzy Hash: c55008aa5c3f91e9e43001bc1849fd373531e9d7cc4444b33f9fe55e6725df89
                                                      • Instruction Fuzzy Hash: 4241B275E012488BEB58DFA6D9946AEFBB2EF89300F24C12AC414AB354DB395946CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377263
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 17a6428672595e0d7e93b117d7008757fe008520b5c9b83041a443b443202d80
                                                      • Instruction ID: 44e81603a8dff87936e598d15ddfc811fd88a383142b97047eaa3eb270ddb035
                                                      • Opcode Fuzzy Hash: 17a6428672595e0d7e93b117d7008757fe008520b5c9b83041a443b443202d80
                                                      • Instruction Fuzzy Hash: 0D41E474E012488BDB58DFAAD8546DEFBF2AF89304F60C12AD418BB354DB385946CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06375CAB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 6836a38aba3d899d83e12967844b1badecfccb00ed02fada0a65a0a36c8634e2
                                                      • Instruction ID: 05760f7829cc07db24d2c2c03f9effe1f3b1652b7d64af463038f90c566f2511
                                                      • Opcode Fuzzy Hash: 6836a38aba3d899d83e12967844b1badecfccb00ed02fada0a65a0a36c8634e2
                                                      • Instruction Fuzzy Hash: 8941C275E01208CBEB58DFAAD9546DEFBF2AF89300F24C12AD418BB254DB395946CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063746F3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 77571057d68e02f088073ead0adb96965f4291baf20c3ea8124d3778c61dd332
                                                      • Instruction ID: accacbab7f293ee8fb8e91482a990a82e38697a72eabb54d1a4160cb2e77fda4
                                                      • Opcode Fuzzy Hash: 77571057d68e02f088073ead0adb96965f4291baf20c3ea8124d3778c61dd332
                                                      • Instruction Fuzzy Hash: 4E41E574E012488BDB58DFAAD9446DEFBF2AF89304F20D12AC418BB355DB385946CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637EBFB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 77ce9d7b0f46459308d95715ff742023f3288a964ab0e9465300aa136d77d89b
                                                      • Instruction ID: b3db758d7d450006f36bd5cb71a23241e963dc97ebbaf4f869c0ff07200d22ff
                                                      • Opcode Fuzzy Hash: 77ce9d7b0f46459308d95715ff742023f3288a964ab0e9465300aa136d77d89b
                                                      • Instruction Fuzzy Hash: 8841F375E012088BEB18DFA6D9546DEFBF2AF89304F24C16AC418BB354DB385946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06375853
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 5460673a4c4cf2efb3a347b7f1874a825f59afecdf27f132d5f12a9d71f3eae5
                                                      • Instruction ID: adbe52424c991b79774b838032045da93cd1e06664138083afa9725db876fe2e
                                                      • Opcode Fuzzy Hash: 5460673a4c4cf2efb3a347b7f1874a825f59afecdf27f132d5f12a9d71f3eae5
                                                      • Instruction Fuzzy Hash: 1B41D274E012488BDB58DFAAD8446EEFBB2EF89310F24C12AD419BB354DB395946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637881B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 44ee9f2b69a2d876bcfe790c365d90b3ae18bdebae2b5df1d0f07bd906219813
                                                      • Instruction ID: 0e8adf3ff0461c399b92d1756bfee79a39bab05c5020d91b619af988bee2fd71
                                                      • Opcode Fuzzy Hash: 44ee9f2b69a2d876bcfe790c365d90b3ae18bdebae2b5df1d0f07bd906219813
                                                      • Instruction Fuzzy Hash: 4C41D1B5E012489BDB58DFAAD88469EFBB2EF89300F24C13AC419AB254DB395945CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637DECB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 36c8600307199cdb915861f7d7b7c3c7b53251836c5d06ee9e0383f5040c2565
                                                      • Instruction ID: 1b338ddaf4a8e048b1bb40477c5ce125a1da43eea3091c53a7906fc49eb3034d
                                                      • Opcode Fuzzy Hash: 36c8600307199cdb915861f7d7b7c3c7b53251836c5d06ee9e0383f5040c2565
                                                      • Instruction Fuzzy Hash: 93410571D01248CBDB18DFAAD9546DEFBF2AF89300F24C16AC818BB255DB395946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637F4AB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 2f0b8ce456b6b60f827ef43290546cf83cd641205b7b8712735541a08eb06d6e
                                                      • Instruction ID: a8238307f8d1b03292243b2fe9bd6fd9337c461c6751952cd9a8390bd9ec15fa
                                                      • Opcode Fuzzy Hash: 2f0b8ce456b6b60f827ef43290546cf83cd641205b7b8712735541a08eb06d6e
                                                      • Instruction Fuzzy Hash: F241D475D01248CBDB58DFAAD9546EEFBB2BF89304F24C12AC814BB254DB395946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06374FA3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: d07fe4c79df5d3b79b553dc7d3c68ce5bc81263f777c537aaafdd173e36b8380
                                                      • Instruction ID: 27d9fc6c14da9618baa3ab6f445ec680eec8a6b8266133a7610f47dfba0066da
                                                      • Opcode Fuzzy Hash: d07fe4c79df5d3b79b553dc7d3c68ce5bc81263f777c537aaafdd173e36b8380
                                                      • Instruction Fuzzy Hash: 1241E275E01208CBEB58DFAAD9506DEBBF2AF89304F20C12AC418BB255DB395946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063739EB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 5ffef092c870b066ad3d8fb3b2b5f8aa838af9063f83caa3364d9b3073d1c816
                                                      • Instruction ID: 523231cbbf609bce81335c8db1efbd2a911b6d4ff0fdcb180efe82c7e49ac68a
                                                      • Opcode Fuzzy Hash: 5ffef092c870b066ad3d8fb3b2b5f8aa838af9063f83caa3364d9b3073d1c816
                                                      • Instruction Fuzzy Hash: 7D41D574D012488BEB58DFA6D8547DEFBB6AF89300F20C12AD818BB254DB385945CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06377B13
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: f5ad67a448f0a4b8d947e6d7a7a08ffe72fcaf5a2746db2431fc951a4456f193
                                                      • Instruction ID: 2912cfc2cff4bc0326cbdf9bac8c9c7d8b7f2eb70cda25cc08e45e5e7ab5cb95
                                                      • Opcode Fuzzy Hash: f5ad67a448f0a4b8d947e6d7a7a08ffe72fcaf5a2746db2431fc951a4456f193
                                                      • Instruction Fuzzy Hash: A941F274E012088FEB58DFAAD8446DEFBB2AF89300F20D12AC418BB354DB385946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06374B4B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 9899aa172bad87625e89be43df2ad26cc3be795f9688245b40c0139db3ff099d
                                                      • Instruction ID: fb43567dc471f1e032c5b8d7aabe1d7dc8e0d391a3b834d61888d33950ba6404
                                                      • Opcode Fuzzy Hash: 9899aa172bad87625e89be43df2ad26cc3be795f9688245b40c0139db3ff099d
                                                      • Instruction Fuzzy Hash: 1341D274E012488BDB58DFAAD8446EEFBF2AF89304F20D12AC418BB359DB395945CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 063753FB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 68148637f7b577ede37377283cd04f2260d938189f341baaabf45764c62f274e
                                                      • Instruction ID: 67adbce485b33b643809093e469181cffd74de316588b546e78855fcb79a1532
                                                      • Opcode Fuzzy Hash: 68148637f7b577ede37377283cd04f2260d938189f341baaabf45764c62f274e
                                                      • Instruction Fuzzy Hash: 7141E274E01248CBDB58DFAAD8546EEFBB2AF89310F64D12AC418BB354DB394946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06376103
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 0f5fb60957bc9eb8cbb088470b1c47f5fd0fcd86c51cd5d8b722d490650bb0b4
                                                      • Instruction ID: d2eee68507b57a19ba1e702c885af4324ce8a2cb3707cd6d8b2eef7e31369ae7
                                                      • Opcode Fuzzy Hash: 0f5fb60957bc9eb8cbb088470b1c47f5fd0fcd86c51cd5d8b722d490650bb0b4
                                                      • Instruction Fuzzy Hash: 2241F574D01648CBDB58DFAAD55569EFBB2AF89304F24C12AC818BB355DB384946CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637655B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 04be8757563f3268f45724e5c1675ba267586ba9906fb01dc6f7417b6b44989e
                                                      • Instruction ID: 708d6380787ace988c7a2eee1b8da302b4f76df82b90eb677b5f5e09811829f1
                                                      • Opcode Fuzzy Hash: 04be8757563f3268f45724e5c1675ba267586ba9906fb01dc6f7417b6b44989e
                                                      • Instruction Fuzzy Hash: DF41F574E01608DBDB18DFA6D9556DEFBB2AF89304F20C12AC418BB358DB385945CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 06376E0B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: e2ad9b7d94880c6a499fbd8f4aef6f4bbc2e74619793ec2a659a58f13a0c830c
                                                      • Instruction ID: 2d1778bd6925f349b29afedd35e66095f8e90b8cdcc48b19cb3e2752d159ff11
                                                      • Opcode Fuzzy Hash: e2ad9b7d94880c6a499fbd8f4aef6f4bbc2e74619793ec2a659a58f13a0c830c
                                                      • Instruction Fuzzy Hash: 0D41E270E012088BDB18DFAAD9556EEFBB2AF89304F20D12AC418BB354DB395946CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637429B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: ae2be8011ca26f50179e1b51fffaca6aa8058ac36319affff15a1c3897c83394
                                                      • Instruction ID: 15f08a3f3a12685737e35928af42ef77dc41e4413ca712297a754c61f36ee5cf
                                                      • Opcode Fuzzy Hash: ae2be8011ca26f50179e1b51fffaca6aa8058ac36319affff15a1c3897c83394
                                                      • Instruction Fuzzy Hash: CB41F5B5E012488FDB58DFAAD9546DEFBF2AF89304F20C12AC414BB255DB385945CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 0637313B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 2dd40de508d11ec7aa93bdfae9f68609d1dcfaf3a6d48c1b5b0fed48dea01165
                                                      • Instruction ID: d7de89b30fa88874c7d702a0d2691c9ec9bbb6c9dc97afed0f077acd6761cce4
                                                      • Opcode Fuzzy Hash: 2dd40de508d11ec7aa93bdfae9f68609d1dcfaf3a6d48c1b5b0fed48dea01165
                                                      • Instruction Fuzzy Hash: FD41E475E012488BEB58DFAAD5446DEFBB2AF89300F24C12AC418BB254DB394945CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b71b84300f6e9da51c83c6899922c444e44997882e5df4e45009367026311660
                                                      • Instruction ID: 847f2c8b11106d7aab96b952003bff7b55b9e8a6d0e6dd340a168a4dd3c66eb6
                                                      • Opcode Fuzzy Hash: b71b84300f6e9da51c83c6899922c444e44997882e5df4e45009367026311660
                                                      • Instruction Fuzzy Hash: CCF1F374E012188FDB14DFA9C884B9DFBB2FF89304F2581A9D808AB355DB75A985CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 806162dcbb875d8c002ed1efa04e88f3075f6fec31e4a612b17c9833711ea6df
                                                      • Instruction ID: 47a229a434a5d0db4b48cb2f9bbea75838a14d62c4c8eef3c0ea3523680b4ffb
                                                      • Opcode Fuzzy Hash: 806162dcbb875d8c002ed1efa04e88f3075f6fec31e4a612b17c9833711ea6df
                                                      • Instruction Fuzzy Hash: A2D1E378E00258CFDB24DFA5D885B9DBBB2FF89304F1080A9D809AB355DB355A85DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 86ab4292c7d35f0928d1220c7fe4441ccc09a72550c6e5ec781053e4a79897f9
                                                      • Instruction ID: 96e89e6e12f1b19566edfa2fbdf91d9d2d8ffd4c8f98c67269d647a16373643a
                                                      • Opcode Fuzzy Hash: 86ab4292c7d35f0928d1220c7fe4441ccc09a72550c6e5ec781053e4a79897f9
                                                      • Instruction Fuzzy Hash: 03C1B378E00218CFDB54DFA5D984BADBBB2FF89304F2081A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3b907607d752288b25804181e5f339caf428d11fe3f0361f81dfa12af46f5820
                                                      • Instruction ID: 85ff7e3856ecbe567df61b1a19ce7e76f4acc7a774bcc9830ecac1b94faa0647
                                                      • Opcode Fuzzy Hash: 3b907607d752288b25804181e5f339caf428d11fe3f0361f81dfa12af46f5820
                                                      • Instruction Fuzzy Hash: E6C1A274E00218CFDB64DFA5D994BADBBB2FF89304F2081A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6e746b306b5516142e3fc4878b3daf0b61c3d63927a66a2432f1806bdb5cc4d
                                                      • Instruction ID: a06d6b286989389533809920e2a3c87a084a3b32a9a64dae8d015ebe79ffdef4
                                                      • Opcode Fuzzy Hash: d6e746b306b5516142e3fc4878b3daf0b61c3d63927a66a2432f1806bdb5cc4d
                                                      • Instruction Fuzzy Hash: 0CD1AF78E00258CFDB24DFA5D984BADBBB2FF89304F2081A9D809A7355DB355A85DF10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bce6264c56765955114a89a43303247da27d90b60f3ca6f6afacd892d5b9aa77
                                                      • Instruction ID: 7bc923ac8a2306847a1f9e1e867eed7565205c2464622d4cf97ffefd3a74c711
                                                      • Opcode Fuzzy Hash: bce6264c56765955114a89a43303247da27d90b60f3ca6f6afacd892d5b9aa77
                                                      • Instruction Fuzzy Hash: 1EC1B378E00218CFDB54DFA5D984BADBBB2FF89304F2081A9D809AB355DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1210fde09c140a29badd9ced4c12c53dec4e6068ad2e1979ad841b5120157ca4
                                                      • Instruction ID: f9490f268f84b2fe66ea2c198a2b0ad0ccafe9e84bf87d70da45a6a169a028e1
                                                      • Opcode Fuzzy Hash: 1210fde09c140a29badd9ced4c12c53dec4e6068ad2e1979ad841b5120157ca4
                                                      • Instruction Fuzzy Hash: 4DD19178E00258CFDB24DFA5D994BADBBB2FF89304F2081A9D809A7354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 324e277039041924c4da11e0c374245b2bff1e333b761cdc2dbd03d34e2360a7
                                                      • Instruction ID: 5f2376629ef62b2632e61ab34db87dc4d6e8bf5cb08fee16129db01dfdb62481
                                                      • Opcode Fuzzy Hash: 324e277039041924c4da11e0c374245b2bff1e333b761cdc2dbd03d34e2360a7
                                                      • Instruction Fuzzy Hash: 82C19F78E00258CFDB14DFA5D984BADBBB2FF89304F2081AAD809A7354DB355A85DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eb86ea3a5f4b6575f632e1b1b89035ae07b3a9df97d8cdf825aa9737edcba205
                                                      • Instruction ID: d4b3aeba9466ba4fcc72e5b62ca4a4146cb313e539e9b8ac16c9538c184502bf
                                                      • Opcode Fuzzy Hash: eb86ea3a5f4b6575f632e1b1b89035ae07b3a9df97d8cdf825aa9737edcba205
                                                      • Instruction Fuzzy Hash: 61C1B174E00218CFDB64DFA5D984BADBBB2FF89304F2080A9D809AB354DB355A85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b4357cca4a187fa53ad9b6ea7220b16384f5be56d92c7600f5959ea33dda339
                                                      • Instruction ID: 49b491faf041b3968388f0a544ca16978c040752b83137e82845898543188e4f
                                                      • Opcode Fuzzy Hash: 4b4357cca4a187fa53ad9b6ea7220b16384f5be56d92c7600f5959ea33dda339
                                                      • Instruction Fuzzy Hash: 73A10474D00208DFDB14DFA9C889BEDBBB1FF89304F209269E508AB291DB759985CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad316d29532c4d8e0119fb6185ae043734fb253ef9716f390380e2b66e80f0c8
                                                      • Instruction ID: bbe3c9668be338191339fe374b9d1cf706008ac17b7ea9f6f1ebd84971c505eb
                                                      • Opcode Fuzzy Hash: ad316d29532c4d8e0119fb6185ae043734fb253ef9716f390380e2b66e80f0c8
                                                      • Instruction Fuzzy Hash: 1FA10474D00208DFDB24DFA9C889BEDBBB1FF89304F209269E508AB291DB755985CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f62b5db42493f9e74f5d196778334d1e3311977269ea9e737e6d6fc91a33130c
                                                      • Instruction ID: 9c817b5cdf54be442f9e535c10fa4d3b566f955b970f9562708c908df33f21a5
                                                      • Opcode Fuzzy Hash: f62b5db42493f9e74f5d196778334d1e3311977269ea9e737e6d6fc91a33130c
                                                      • Instruction Fuzzy Hash: 03912574D00608DFDB14DFA8C489BEDBBB5FF49304F2092AAE509AB291DB719985CF11
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 02B43506
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: b6f0d53f4f496a18f6f7871467f83208cb6e890d8d820fe2140e0373204c3b31
                                                      • Instruction ID: 6c9c70b7889b6845f76795ca39fb9b881a1290bf44760521c3ec9a439d5bb239
                                                      • Opcode Fuzzy Hash: b6f0d53f4f496a18f6f7871467f83208cb6e890d8d820fe2140e0373204c3b31
                                                      • Instruction Fuzzy Hash: C151F03943160AEFC2202B61BAAE17EBFB6FF5F7137417C10B20A818958FB4004ADA15
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 02B43506
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: b2ed1c3be6c9d3315887ec6152e6e41d09eeae60f29ff8d1efdae468c3b3127b
                                                      • Instruction ID: fab8cfb96215c4503d73af862f063ab67b439225a48bcd4e9f661cd29b2f6df3
                                                      • Opcode Fuzzy Hash: b2ed1c3be6c9d3315887ec6152e6e41d09eeae60f29ff8d1efdae468c3b3127b
                                                      • Instruction Fuzzy Hash: 0251EF3943164AEFC6203B61BAAE17EBFB6FF5F713741BC10B20A908949FB40049DA55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 06372C3A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: bdb6434c0583dad3d07e47fe0c5bbc8feb706ddfcacb353e9f4baaa139c87318
                                                      • Instruction ID: f3794ed8a039618e6aaac672543b05109d6838de2a82c14ee168d5c8488821ba
                                                      • Opcode Fuzzy Hash: bdb6434c0583dad3d07e47fe0c5bbc8feb706ddfcacb353e9f4baaa139c87318
                                                      • Instruction Fuzzy Hash: 5851F4B4D01218DFDB18DFAAD8846DEBBB2FF88310F10C129D414AB294DB789949CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5db0fa314529a9b4b529276f492bcf0a6199b8c7d2be9aad213e00157c94b28b
                                                      • Instruction ID: 37b5b50428ee42a1348284958b1383e55ca67955d0065007eee0ed508e9bab48
                                                      • Opcode Fuzzy Hash: 5db0fa314529a9b4b529276f492bcf0a6199b8c7d2be9aad213e00157c94b28b
                                                      • Instruction Fuzzy Hash: 66510074D05208CFDB64CFA9D4846DEBBB5FF49311F209129E425BB290D7389A85CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4bb8bab41164a5003c2f78c5c8d9a8ea219efb053aad4c04a907a05cd8bb18d8
                                                      • Instruction ID: 6b5adf1e33b7bd23b2f68b89dae30fc98e84df2ea5583ab365a311bbbaf630cb
                                                      • Opcode Fuzzy Hash: 4bb8bab41164a5003c2f78c5c8d9a8ea219efb053aad4c04a907a05cd8bb18d8
                                                      • Instruction Fuzzy Hash: 7F414D74904109CFDB64CFA8D4C0AEEF7F6BF48304F259158D449AB685C735AA86CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 2fb5d818f4d151665ed5f8875f6757716a78b8d7eb2e46d681cefd5c623d9a01
                                                      • Instruction ID: 09f71d1b1a19c8e509dbfa74732998631de8c911fb5cf8aec8aacbeb9bb56c76
                                                      • Opcode Fuzzy Hash: 2fb5d818f4d151665ed5f8875f6757716a78b8d7eb2e46d681cefd5c623d9a01
                                                      • Instruction Fuzzy Hash: 57415B74D00108DFDB24CFA9C5C4ADEFBB2BF88314F259159D40467685CB35AA9ACB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f7267fb9c3455edd3ef507ac7bcfd63d4fd143c05498af725399310f59addc57
                                                      • Instruction ID: 4a9aca586d5160442a89f5490d8ceaedf92a5136ae4c7dd1bdcaece984f01292
                                                      • Opcode Fuzzy Hash: f7267fb9c3455edd3ef507ac7bcfd63d4fd143c05498af725399310f59addc57
                                                      • Instruction Fuzzy Hash: 29412474D14109CFDB64CFA8D084AEEF7B6FF48314F259158E409A7681C739AA86CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617403627.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_fed000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3831bb5dbd2956a64af3b17faaaea3e7436b294970ebeec40815eabfffaf85e8
                                                      • Instruction ID: 80c930bd3f32cb6a61cbb1fd48172dc4de5aee81760dddac0d1ed7f53b3a9728
                                                      • Opcode Fuzzy Hash: 3831bb5dbd2956a64af3b17faaaea3e7436b294970ebeec40815eabfffaf85e8
                                                      • Instruction Fuzzy Hash: 49213A72504284DFDF15DF10D8C0F1ABF65FBA4324F24C569E9054B686C336E845EBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617435910.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_ffd000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: abcda723ac87b3f6d542a226207f35ca4f346662c4ec8290dd2ebd299b27105e
                                                      • Instruction ID: 0cc6355ddb54345d6402dbc7bb2b73083c0ff06ca503f18292825d7c049e4b6e
                                                      • Opcode Fuzzy Hash: abcda723ac87b3f6d542a226207f35ca4f346662c4ec8290dd2ebd299b27105e
                                                      • Instruction Fuzzy Hash: 86210772604248DFDB14DF14D8C0B26BB66FF84324F24C569EA094B25ACB3AD847EA61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617435910.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_ffd000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 092171f421b2f843005b370d8f0b843ebb192614a8809dae03d847ef27058168
                                                      • Instruction ID: 3f22b8be76d0bcc1b65ed765c3f398d56c825dc54a174212629b8a91888275cc
                                                      • Opcode Fuzzy Hash: 092171f421b2f843005b370d8f0b843ebb192614a8809dae03d847ef27058168
                                                      • Instruction Fuzzy Hash: 8D2180755093C48FCB02CF20D990715BF71EF46324F28C5EAD9498B6A7C33A980ADB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617403627.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_fed000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2a9d003929d6dc02cb6594d9b18e81f81af5a06eac6336c657b4c9dac273578b
                                                      • Instruction ID: ec92b3f52aede6b971593ecc7497c367d841fc163e5ee38e5712711a3b9e05a2
                                                      • Opcode Fuzzy Hash: 2a9d003929d6dc02cb6594d9b18e81f81af5a06eac6336c657b4c9dac273578b
                                                      • Instruction Fuzzy Hash: 2C11B176904284DFCB16CF10D9C4B16BF71FB94324F24C6A9D8050BA56C33AE85ADBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 51c0e38f85855436137e8722bf55ad6485088d0beeb6fa3efc600d625931c7ed
                                                      • Instruction ID: 98aeee6fe67224856f61d0a54d3cef8557439beafd04a8ec9833318bc6dc6e93
                                                      • Opcode Fuzzy Hash: 51c0e38f85855436137e8722bf55ad6485088d0beeb6fa3efc600d625931c7ed
                                                      • Instruction Fuzzy Hash: 69529A74E002688FDB64DF65C884BADBBB2BF89304F1085EAD509AB354DB359E85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 811655697ae041e42bb49ee59d262964c8abfdecf962f4daa780f5841da3b958
                                                      • Instruction ID: 1f839f8c3437b4a3b1e134182d803d2043a15b206061b16f757fd4095999cc66
                                                      • Opcode Fuzzy Hash: 811655697ae041e42bb49ee59d262964c8abfdecf962f4daa780f5841da3b958
                                                      • Instruction Fuzzy Hash: 60B1A874E00218CFDB54DFA9D884A9DBBF2FF89314F1181AAD819AB365DB34A941CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2653f56b42b109e3dc34e9de5c1b8c9b2cda222e84be5cee9ec5e1c253784f7
                                                      • Instruction ID: 3cd493a163daddc79ca8224057173f8d7eca5473ed0e2d84e218b214255ae569
                                                      • Opcode Fuzzy Hash: b2653f56b42b109e3dc34e9de5c1b8c9b2cda222e84be5cee9ec5e1c253784f7
                                                      • Instruction Fuzzy Hash: CFA1BF74A01268DFDB64DF64C894B99BBB2BF4A301F5085EAD80DA7354DB319E80CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c6bfa02db5c5caa93be6def33a4392091f19002a447c0df8548e8356382c0987
                                                      • Instruction ID: 762b6467b85314eeaf1f0d42b8d9c1ddd223ad0ce5f26148aef1e99b70b7fc79
                                                      • Opcode Fuzzy Hash: c6bfa02db5c5caa93be6def33a4392091f19002a447c0df8548e8356382c0987
                                                      • Instruction Fuzzy Hash: 61519975E00608CFDB54DFAAD884A9DBBF2FF89300F14916AD419AB365DB349941CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.617754919.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_2b40000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b579ee3a4eeeccbece4a428f04198e2eefa2390eefffeb2160a9274e7823e6d
                                                      • Instruction ID: a9e92ce39d874ca6c42497d2901717d0ed805c7d3e96c866c2c78c6ee1038e02
                                                      • Opcode Fuzzy Hash: 5b579ee3a4eeeccbece4a428f04198e2eefa2390eefffeb2160a9274e7823e6d
                                                      • Instruction Fuzzy Hash: 76519274A01228DFCB64DF24D894BE9B7B2BF4A305F5095E9E80AA7354DB319E81CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.619277522.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_6370000_t40mINaB76.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7f0e34beff8db7fb46c9ab795620371a16be6ea153d5d8243b7428139328541a
                                                      • Instruction ID: 04905e841e52d63dd29d2c9d6b947a0bd19653d44581f61cf7314c58adac8721
                                                      • Opcode Fuzzy Hash: 7f0e34beff8db7fb46c9ab795620371a16be6ea153d5d8243b7428139328541a
                                                      • Instruction Fuzzy Hash: 63D09E34D142588BCB20DFA4D9903ADB776BB87300F0121D5851DB3210DB309E549F86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%