Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HvAnUIF17C.exe

Overview

General Information

Sample Name:HvAnUIF17C.exe
Analysis ID:652386
MD5:515bae8e826da0259aea4c4f3f05a654
SHA1:b17e6b0aecf3c98bf27c6d3c03411007c964a35b
SHA256:1f446fcfd533aab46514bc919c327c75e9dae84d6086777beeed532cdb787c85
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • HvAnUIF17C.exe (PID: 5684 cmdline: "C:\Users\user\Desktop\HvAnUIF17C.exe" MD5: 515BAE8E826DA0259AEA4C4F3F05A654)
    • HvAnUIF17C.exe (PID: 3120 cmdline: C:\Users\user\Desktop\HvAnUIF17C.exe MD5: 515BAE8E826DA0259AEA4C4F3F05A654)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "5125489580:AAG9rJipU-Qp9bVmgyzvimlz5gpATRgg5qo", "Telegram ID": "5149913163"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x18570:$x1: $%SMTPDV$
        • 0x17232:$x2: $#TheHashHere%&
        • 0x18518:$x3: %FTPDV$
        • 0x17214:$x4: $%TelegramDv$
        • 0x14b95:$x5: KeyLoggerEventArgs
        • 0x14f2b:$x5: KeyLoggerEventArgs
        • 0x1859c:$m1: | Snake Keylogger
        • 0x18642:$m1: | Snake Keylogger
        • 0x18796:$m1: | Snake Keylogger
        • 0x188bc:$m1: | Snake Keylogger
        • 0x18a16:$m1: | Snake Keylogger
        • 0x1853c:$m2: Clipboard Logs ID
        • 0x1874c:$m2: Screenshot Logs ID
        • 0x18860:$m2: keystroke Logs ID
        • 0x18a4c:$m3: SnakePW
        • 0x18724:$m4: \SnakeKeylogger\
        00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 28 entries
          SourceRuleDescriptionAuthorStrings
          4.0.HvAnUIF17C.exe.400000.4.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b070:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a259:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a6a0:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1b821:$a5: \Kometa\User Data\Default\Login Data
          4.0.HvAnUIF17C.exe.400000.4.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            4.0.HvAnUIF17C.exe.400000.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              4.0.HvAnUIF17C.exe.400000.4.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                4.0.HvAnUIF17C.exe.400000.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 62 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.4193.122.130.049760802842536 06/26/22-09:34:00.732371
                  SID:2842536
                  Source Port:49760
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: HvAnUIF17C.exeVirustotal: Detection: 35%Perma Link
                  Source: HvAnUIF17C.exeReversingLabs: Detection: 50%
                  Source: HvAnUIF17C.exeJoe Sandbox ML: detected
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5125489580:AAG9rJipU-Qp9bVmgyzvimlz5gpATRgg5qo", "Telegram ID": "5149913163"}
                  Source: HvAnUIF17C.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: HvAnUIF17C.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A63D1h4_2_018A6111
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A8687h4_2_018A83C9
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A7DC7h4_2_018A7B08
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018AFDE9h4_2_018AFB30
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018AF539h4_2_018AF280
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A7507h4_2_018A7200
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A5F70h4_2_018A5587
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018AEC8Ah4_2_018AE758
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A8227h4_2_018A7F68
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A7967h4_2_018A76A8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018AF991h4_2_018AF6D8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A6B10h4_2_018A66F8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018AF0E1h4_2_018AEE28
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_018A50DB
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_018A4AA8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_018A52BC
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A6B10h4_2_018A6A3E
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 018A6B10h4_2_018A66E8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05AB0741h4_2_05AB0498
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05AB02E9h4_2_05AB0040
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05AB0B99h4_2_05AB08F0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCFAE1h4_2_05FCF838
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCF689h4_2_05FCF3E0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCF231h4_2_05FCEF88
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCEDD9h4_2_05FCEB30
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCE981h4_2_05FCE6D8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FCE529h4_2_05FCE280
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC7899h4_2_05FC75F0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC4479h4_2_05FC41D0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC7441h4_2_05FC7198
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC4021h4_2_05FC3D78
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC6FE9h4_2_05FC6D40
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC3BC9h4_2_05FC3920
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC6B91h4_2_05FC68E8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC3771h4_2_05FC34C8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC6739h4_2_05FC6490
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC3319h4_2_05FC3070
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC62E1h4_2_05FC6038
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_05FCC020
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_05FCC00F
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4x nop then jmp 05FC5E89h4_2_05FC5BE0

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.4:49760 -> 193.122.130.0:80
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: HvAnUIF17C.exe, 00000004.00000002.511505410.0000000003556000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: HvAnUIF17C.exe, 00000004.00000002.511395073.0000000003549000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000002.511505410.0000000003556000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: HvAnUIF17C.exe, 00000004.00000002.511172584.00000000034B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: HvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: HvAnUIF17C.exe, 00000004.00000002.511395073.0000000003549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: HvAnUIF17C.exe, 00000004.00000002.511172584.00000000034B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: HvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                  System Summary

                  barindex
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: HvAnUIF17C.exe PID: 3120, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: HvAnUIF17C.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: HvAnUIF17C.exe PID: 3120, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1ACB30_2_00F1ACB3
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1B2B40_2_00F1B2B4
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1AA860_2_00F1AA86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1AE860_2_00F1AE86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1B0860_2_00F1B086
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1ABBB0_2_00F1ABBB
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1B1860_2_00F1B186
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_00F1AF860_2_00F1AF86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_018DC8740_2_018DC874
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_018DECA80_2_018DECA8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_018DECB80_2_018DECB8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEB2B44_2_00FEB2B4
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEACB34_2_00FEACB3
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEAA864_2_00FEAA86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEAE864_2_00FEAE86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEB0864_2_00FEB086
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEABBB4_2_00FEABBB
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEB1864_2_00FEB186
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_00FEAF864_2_00FEAF86
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A61114_2_018A6111
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A6B884_2_018A6B88
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A83C94_2_018A83C9
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A7B084_2_018A7B08
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AFB304_2_018AFB30
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AF2804_2_018AF280
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A72004_2_018A7200
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A55874_2_018A5587
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AA45A4_2_018AA45A
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AE7584_2_018AE758
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A7F684_2_018A7F68
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A76A84_2_018A76A8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AF6D84_2_018AF6D8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018AEE284_2_018AEE28
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A6B784_2_018A6B78
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A4A984_2_018A4A98
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A4AA84_2_018A4AA8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A72484_2_018A7248
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018ADFD04_2_018ADFD0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018ADFE04_2_018ADFE0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB04984_2_05AB0498
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB00404_2_05AB0040
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB23984_2_05AB2398
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB43184_2_05AB4318
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB4FB04_2_05AB4FB0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB29E04_2_05AB29E0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB49684_2_05AB4968
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB08F04_2_05AB08F0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB16F84_2_05AB16F8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB36784_2_05AB3678
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB30284_2_05AB3028
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB1D484_2_05AB1D48
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB3CC84_2_05AB3CC8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB048B4_2_05AB048B
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB00074_2_05AB0007
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB23884_2_05AB2388
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB43094_2_05AB4309
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB4F9F4_2_05AB4F9F
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB29CF4_2_05AB29CF
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB49594_2_05AB4959
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB08E04_2_05AB08E0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB16E94_2_05AB16E9
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB36684_2_05AB3668
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB30184_2_05AB3018
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB1D384_2_05AB1D38
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05AB3CB94_2_05AB3CB9
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCF8384_2_05FCF838
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCF3E04_2_05FCF3E0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCEF884_2_05FCEF88
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCEB304_2_05FCEB30
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCE6D84_2_05FCE6D8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCE2804_2_05FCE280
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC75F04_2_05FC75F0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCDDF04_2_05FCDDF0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC75E04_2_05FC75E0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC41D04_2_05FC41D0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC41C04_2_05FC41C0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC71984_2_05FC7198
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC71884_2_05FC7188
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC3D784_2_05FC3D78
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC3D684_2_05FC3D68
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC6D404_2_05FC6D40
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC6D364_2_05FC6D36
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC39204_2_05FC3920
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC39104_2_05FC3910
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC68E84_2_05FC68E8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC68D84_2_05FC68D8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC34C84_2_05FC34C8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC34B84_2_05FC34B8
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCD0984_2_05FCD098
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC64904_2_05FC6490
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC64824_2_05FC6482
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC30704_2_05FC3070
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC30624_2_05FC3062
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC00404_2_05FC0040
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC60384_2_05FC6038
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC60284_2_05FC6028
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCF8284_2_05FCF828
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCC0204_2_05FCC020
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FCC00F4_2_05FCC00F
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC00064_2_05FC0006
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC5BE04_2_05FC5BE0
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_05FC5BDA4_2_05FC5BDA
                  Source: HvAnUIF17C.exeBinary or memory string: OriginalFilename vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.283477487.0000000007880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.283832387.0000000007A90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.283419478.00000000077E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exeBinary or memory string: OriginalFilename vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000004.00000002.509373688.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exe, 00000004.00000002.509889737.00000000014F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exeBinary or memory string: OriginalFilenameICustomPropertyProviderPr.exeF vs HvAnUIF17C.exe
                  Source: HvAnUIF17C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: HvAnUIF17C.exeVirustotal: Detection: 35%
                  Source: HvAnUIF17C.exeReversingLabs: Detection: 50%
                  Source: HvAnUIF17C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\HvAnUIF17C.exe "C:\Users\user\Desktop\HvAnUIF17C.exe"
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess created: C:\Users\user\Desktop\HvAnUIF17C.exe C:\Users\user\Desktop\HvAnUIF17C.exe
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess created: C:\Users\user\Desktop\HvAnUIF17C.exe C:\Users\user\Desktop\HvAnUIF17C.exeJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HvAnUIF17C.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: HvAnUIF17C.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: HvAnUIF17C.exe, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.HvAnUIF17C.exe.f10000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.HvAnUIF17C.exe.f10000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.0.HvAnUIF17C.exe.fe0000.13.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.0.HvAnUIF17C.exe.fe0000.9.unpack, CIS443Homework1___InterfaceFiles/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, ?B???/?2ud95fude2bufffd.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: HvAnUIF17C.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: HvAnUIF17C.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: HvAnUIF17C.exe, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.HvAnUIF17C.exe.f10000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.2.HvAnUIF17C.exe.f10000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.13.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.9.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.7.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.5.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.2.HvAnUIF17C.exe.fe0000.1.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.11.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.3.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.2.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.1.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.HvAnUIF17C.exe.fe0000.0.unpack, CIS443Homework1___InterfaceFiles/Form1.cs.Net Code: THAI04 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A1B69 push 8BFFFFFFh; retf 4_2_018A1B6F
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A8F09 push FFFFFF8Bh; iretd 4_2_018A8F0D
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.922642417266635
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.278554759.000000000333B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTR
                  Source: HvAnUIF17C.exe, 00000000.00000002.278554759.000000000333B000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: HvAnUIF17C.exe, 00000000.00000002.278554759.000000000333B000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exe TID: 3536Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 0_2_077E1515 sldt word ptr [eax]0_2_077E1515
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: HvAnUIF17C.exe, 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeCode function: 4_2_018A6B88 LdrInitializeThunk,4_2_018A6B88
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.2.HvAnUIF17C.exe.400000.0.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.6.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.8.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.4.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.10.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, u0097?A?ufffd/?ufffd???.csReference to suspicious API methods: ('????U', 'MapVirtualKey@user32.dll')
                  Source: 4.0.HvAnUIF17C.exe.400000.12.unpack, z?ufffd??/????W.csReference to suspicious API methods: ('??O??', 'GetProcAddress@kernel32'), ('?????', 'LoadLibrary@kernel32.dll')
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeMemory written: C:\Users\user\Desktop\HvAnUIF17C.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeProcess created: C:\Users\user\Desktop\HvAnUIF17C.exe C:\Users\user\Desktop\HvAnUIF17C.exeJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Users\user\Desktop\HvAnUIF17C.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Users\user\Desktop\HvAnUIF17C.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 3120, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\HvAnUIF17C.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 3120, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.HvAnUIF17C.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.HvAnUIF17C.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.45d9dc0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.454d1a0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HvAnUIF17C.exe.44dff28.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 5684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HvAnUIF17C.exe PID: 3120, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common3
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  HvAnUIF17C.exe36%VirustotalBrowse
                  HvAnUIF17C.exe9%MetadefenderBrowse
                  HvAnUIF17C.exe50%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                  HvAnUIF17C.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  4.2.HvAnUIF17C.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  4.0.HvAnUIF17C.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  4.0.HvAnUIF17C.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  4.0.HvAnUIF17C.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  4.0.HvAnUIF17C.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  4.0.HvAnUIF17C.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://checkip.dyndns.org40%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  checkip.dyndns.com
                  193.122.130.0
                  truetrue
                    unknown
                    checkip.dyndns.org
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.apache.org/licenses/LICENSE-2.0HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/?HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.org/botHvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers?HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.tiro.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.orgHvAnUIF17C.exe, 00000004.00000002.511395073.0000000003549000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000002.511505410.0000000003556000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.goodfont.co.krHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.org4HvAnUIF17C.exe, 00000004.00000002.511395073.0000000003549000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-user.htmlHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/qHvAnUIF17C.exe, 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, HvAnUIF17C.exe, 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8HvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fonts.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://checkip.dyndns.comHvAnUIF17C.exe, 00000004.00000002.511505410.0000000003556000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaseHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHvAnUIF17C.exe, 00000004.00000002.511172584.00000000034B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.sakkal.comHvAnUIF17C.exe, 00000000.00000002.282080429.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              193.122.130.0
                                              checkip.dyndns.comUnited States
                                              31898ORACLE-BMC-31898UStrue
                                              Joe Sandbox Version:35.0.0 Citrine
                                              Analysis ID:652386
                                              Start date and time: 26/06/202209:32:322022-06-26 09:32:32 +02:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 10m 21s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:HvAnUIF17C.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:25
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:
                                              • Successful, ratio: 2.6% (good quality ratio 0.5%)
                                              • Quality average: 9.6%
                                              • Quality standard deviation: 24.8%
                                              HCA Information:
                                              • Successful, ratio: 85%
                                              • Number of executed functions: 53
                                              • Number of non-executed functions: 29
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                              • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              09:33:48API Interceptor1x Sleep call for process: HvAnUIF17C.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              193.122.130.0oAE7nqtsNA.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              0OZQi3b0tM.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              ZzO0LX45zz.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              FNK08uYGy6.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              4vQAHpapFz.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              aercUUUX2C.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              Import shipment.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              tka30O3OZN.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              ViAKIk7T7X.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              4008765678900--98765.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              F96UcEk8Z9.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              t5nmFGhdVA.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              Order Details.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              uc2RxH8hO7.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              gsjRXEqpy51bLEm.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              RFQ_5076414.exeGet hashmaliciousBrowse
                                              • checkip.dyndns.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              checkip.dyndns.comoAE7nqtsNA.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              0OZQi3b0tM.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              ZzO0LX45zz.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              FNK08uYGy6.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              MV CHINALAND.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              Import shipment.exeGet hashmaliciousBrowse
                                              • 132.226.247.73
                                              MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              4vQAHpapFz.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                              • 193.122.6.168
                                              gD5LFrPtfc.exeGet hashmaliciousBrowse
                                              • 132.226.247.73
                                              aercUUUX2C.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              vSgQo7dqYG.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              MV CHINALAND.exeGet hashmaliciousBrowse
                                              • 132.226.8.169
                                              22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              Import shipment.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              tka30O3OZN.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                              • 132.226.247.73
                                              Docume001.exeGet hashmaliciousBrowse
                                              • 132.226.8.169
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              ORACLE-BMC-31898USoAE7nqtsNA.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              0OZQi3b0tM.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              ZzO0LX45zz.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              FNK08uYGy6.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              MV CHINALAND.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              4vQAHpapFz.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                              • 193.122.6.168
                                              aercUUUX2C.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              vSgQo7dqYG.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                              • 158.101.44.242
                                              CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              Import shipment.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              tka30O3OZN.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              ViAKIk7T7X.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              4008765678900--98765.exeGet hashmaliciousBrowse
                                              • 193.122.130.0
                                              https://wallpaperaccess.com/miami-nightGet hashmaliciousBrowse
                                              • 150.136.25.38
                                              b8sqHJocuX.exeGet hashmaliciousBrowse
                                              • 193.122.6.168
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\HvAnUIF17C.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.916901106793155
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:HvAnUIF17C.exe
                                              File size:720384
                                              MD5:515bae8e826da0259aea4c4f3f05a654
                                              SHA1:b17e6b0aecf3c98bf27c6d3c03411007c964a35b
                                              SHA256:1f446fcfd533aab46514bc919c327c75e9dae84d6086777beeed532cdb787c85
                                              SHA512:3d4459645525b07d06a346af096b47d499cef495013eb0f8b8df2f750c74892b64cd74ee7c59f30796e0f8fa7f153bc3b174bdbbce83d7d27677350db2960545
                                              SSDEEP:12288:/xgH2iN1kPRxliW12/vxmScPAnxmy674XKsQBV8rnBFt7Lie+LNU3NayyfRo:K13kPRrh2/5CPAnxMMXRQ/0b0vxU3NaH
                                              TLSH:79E41299E3A41EAAC08353F91C6CE5442A1BF70E82BCC60AB4F6355AE5723D59063F17
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z..b..............0.................. ... ....@.. .......................`............@................................
                                              Icon Hash:00828e8e8686b000
                                              Entrypoint:0x4b1496
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x62B71C5A [Sat Jun 25 14:31:54 2022 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              dec eax
                                              push edx
                                              dec eax
                                              inc ecx
                                              xor eax, 45373434h
                                              cmp byte ptr [3534564Eh], dh
                                              xor eax, 4F373751h
                                              push esp
                                              inc ecx
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb14440x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x3e0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xaf4b40xaf600False0.9178977525837491data7.922642417266635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xb20000x3e00x400False0.3896484375data3.1085984086504888IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xb40000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xb20580x384data
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              192.168.2.4193.122.130.049760802842536 06/26/22-09:34:00.732371TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4976080192.168.2.4193.122.130.0
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jun 26, 2022 09:34:00.624166965 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:34:00.731515884 CEST8049760193.122.130.0192.168.2.4
                                              Jun 26, 2022 09:34:00.731792927 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:34:00.732371092 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:34:00.839612961 CEST8049760193.122.130.0192.168.2.4
                                              Jun 26, 2022 09:34:00.840661049 CEST8049760193.122.130.0192.168.2.4
                                              Jun 26, 2022 09:34:00.920098066 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:35:05.842036963 CEST8049760193.122.130.0192.168.2.4
                                              Jun 26, 2022 09:35:05.843590975 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:35:40.855221033 CEST4976080192.168.2.4193.122.130.0
                                              Jun 26, 2022 09:35:40.966523886 CEST8049760193.122.130.0192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jun 26, 2022 09:34:00.512381077 CEST6445453192.168.2.48.8.8.8
                                              Jun 26, 2022 09:34:00.530930042 CEST53644548.8.8.8192.168.2.4
                                              Jun 26, 2022 09:34:00.549586058 CEST6050653192.168.2.48.8.8.8
                                              Jun 26, 2022 09:34:00.566579103 CEST53605068.8.8.8192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Jun 26, 2022 09:34:00.512381077 CEST192.168.2.48.8.8.80x279Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.549586058 CEST192.168.2.48.8.8.80x6bf4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.530930042 CEST8.8.8.8192.168.2.40x279No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                              Jun 26, 2022 09:34:00.566579103 CEST8.8.8.8192.168.2.40x6bf4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.449760193.122.130.080C:\Users\user\Desktop\HvAnUIF17C.exe
                                              TimestampkBytes transferredDirectionData
                                              Jun 26, 2022 09:34:00.732371092 CEST1139OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Jun 26, 2022 09:34:00.840661049 CEST1139INHTTP/1.1 200 OK
                                              Date: Sun, 26 Jun 2022 07:34:00 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:09:33:38
                                              Start date:26/06/2022
                                              Path:C:\Users\user\Desktop\HvAnUIF17C.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\HvAnUIF17C.exe"
                                              Imagebase:0xf10000
                                              File size:720384 bytes
                                              MD5 hash:515BAE8E826DA0259AEA4C4F3F05A654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.278554759.000000000333B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.279912469.00000000044DF000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.278443910.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low

                                              Target ID:4
                                              Start time:09:33:49
                                              Start date:26/06/2022
                                              Path:C:\Users\user\Desktop\HvAnUIF17C.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\HvAnUIF17C.exe
                                              Imagebase:0xfe0000
                                              File size:720384 bytes
                                              MD5 hash:515BAE8E826DA0259AEA4C4F3F05A654
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.266393482.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.509304253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.266790550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.266009764.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.267402332.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:10.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:80
                                                Total number of Limit Nodes:5
                                                execution_graph 9399 18d98d0 9402 18d9dd0 9399->9402 9400 18d98df 9403 18d9de3 9402->9403 9404 18d9dfb 9403->9404 9410 18da058 9403->9410 9414 18da04b 9403->9414 9404->9400 9405 18d9df3 9405->9404 9406 18d9ff8 GetModuleHandleW 9405->9406 9407 18da025 9406->9407 9407->9400 9411 18da05d 9410->9411 9412 18da091 9411->9412 9418 18d99e8 9411->9418 9412->9405 9416 18da058 9414->9416 9415 18da091 9415->9405 9416->9415 9417 18d99e8 LoadLibraryExW 9416->9417 9417->9415 9419 18da238 LoadLibraryExW 9418->9419 9421 18da2b1 9419->9421 9421->9412 9422 18dbdd0 9423 18dbe36 9422->9423 9426 18dbf90 9423->9426 9429 18d9d70 9426->9429 9430 18dbff8 DuplicateHandle 9429->9430 9431 18dbee5 9430->9431 9432 18d40d0 9433 18d40d1 9432->9433 9434 18d40ee 9433->9434 9438 18d41e0 9433->9438 9443 18d3c64 9434->9443 9436 18d410d 9439 18d41e4 9438->9439 9447 18d42d0 9439->9447 9451 18d42e0 9439->9451 9444 18d3c6f 9443->9444 9459 18d51a4 9444->9459 9446 18d7040 9446->9436 9449 18d42d4 9447->9449 9448 18d43e4 9448->9448 9449->9448 9455 18d3de4 9449->9455 9453 18d42e1 9451->9453 9452 18d43e4 9452->9452 9453->9452 9454 18d3de4 CreateActCtxA 9453->9454 9454->9452 9456 18d5370 CreateActCtxA 9455->9456 9458 18d5433 9456->9458 9460 18d51af 9459->9460 9463 18d5b30 9460->9463 9462 18d71f5 9462->9446 9464 18d5b3b 9463->9464 9467 18d6cc8 9464->9467 9466 18d72da 9466->9462 9468 18d6cd3 9467->9468 9471 18d6cf8 9468->9471 9470 18d73ca 9470->9466 9473 18d6d03 9471->9473 9472 18d7b1c 9472->9470 9473->9472 9475 18dba00 9473->9475 9476 18dba21 9475->9476 9477 18dba45 9476->9477 9479 18dbcb8 9476->9479 9477->9472 9480 18dbcc5 9479->9480 9481 18dbcff 9480->9481 9483 18d9ce8 9480->9483 9481->9477 9484 18d9cf3 9483->9484 9486 18dc9f8 9484->9486 9487 18dc5b8 9484->9487 9486->9486 9488 18dc5c3 9487->9488 9489 18d6cf8 2 API calls 9488->9489 9490 18dca67 9489->9490 9494 18de7f0 9490->9494 9500 18de7d8 9490->9500 9491 18dcaa0 9491->9486 9496 18de86d 9494->9496 9497 18de821 9494->9497 9495 18de82d 9495->9491 9496->9491 9497->9495 9498 18dec60 LoadLibraryExW GetModuleHandleW 9497->9498 9499 18dec70 LoadLibraryExW GetModuleHandleW 9497->9499 9498->9496 9499->9496 9502 18de7e4 9500->9502 9501 18de82d 9501->9491 9502->9501 9503 18dec60 LoadLibraryExW GetModuleHandleW 9502->9503 9504 18dec70 LoadLibraryExW GetModuleHandleW 9502->9504 9503->9501 9504->9501

                                                Control-flow Graph

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 018DA016
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 156de830da506755f8bd37ce0dbb494e83e253e57a09b7a92f035cdeca2c7a87
                                                • Instruction ID: df2c217c3965f043b68c185ce05f071f82fdf9ec8b6f89596931bf2d2d8989b5
                                                • Opcode Fuzzy Hash: 156de830da506755f8bd37ce0dbb494e83e253e57a09b7a92f035cdeca2c7a87
                                                • Instruction Fuzzy Hash: 19713670A00B059FDB24DF6AD44475ABBF1FF88318F00892DD58AD7A40DB75EA09CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 60 18d3de4-18d5431 CreateActCtxA 63 18d543a-18d5494 60->63 64 18d5433-18d5439 60->64 71 18d5496-18d5499 63->71 72 18d54a3-18d54a7 63->72 64->63 71->72 73 18d54a9-18d54b5 72->73 74 18d54b8 72->74 73->74
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 018D5421
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 9d0b400a0c244bd462c32bb3999bcc5118cf8d4a744fc6f294f06f4beaa96f31
                                                • Instruction ID: 382db3d350660f6b8eae632e7db971d93b0b91308489a54b3f1e0094bf610173
                                                • Opcode Fuzzy Hash: 9d0b400a0c244bd462c32bb3999bcc5118cf8d4a744fc6f294f06f4beaa96f31
                                                • Instruction Fuzzy Hash: 1D41E5B0D04718CFDB24DFA9C884BDDBBB5BF89308F10815AD518AB250DB756945CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 76 18d9d70-18dc08c DuplicateHandle 78 18dc08e-18dc094 76->78 79 18dc095-18dc0b2 76->79 78->79
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,018DBFBE,?,?,?,?,?), ref: 018DC07F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 1f13f11452b0ee7fe62a765fc993b5a3ec1e63c93a2dc1d1e5d3d9fe7be0cb3c
                                                • Instruction ID: c91808943bf71f17f0ab0bd21c727115adf23cfe29821c274c30371a0ec79ac5
                                                • Opcode Fuzzy Hash: 1f13f11452b0ee7fe62a765fc993b5a3ec1e63c93a2dc1d1e5d3d9fe7be0cb3c
                                                • Instruction Fuzzy Hash: 0F21E3B5900348AFDB10CFAAD984ADEBBF8EB48324F14841AE914A7310D774A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 82 18da230-18da232 83 18da239-18da23c 82->83 84 18da234-18da236 82->84 85 18da23d-18da278 83->85 84->85 86 18da238 84->86 87 18da27a-18da27d 85->87 88 18da280-18da2af LoadLibraryExW 85->88 86->83 87->88 89 18da2b8-18da2d5 88->89 90 18da2b1-18da2b7 88->90 90->89
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018DA091,00000800,00000000,00000000), ref: 018DA2A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: d986110f780a038cf75a99cdfc25aeb9bbe205ac6c3eb526e62130d98f497e9f
                                                • Instruction ID: 3f9c4a941c55e7108173131ba9f18cbd5eea52bce0a62243fbdc67cc7dfe87f0
                                                • Opcode Fuzzy Hash: d986110f780a038cf75a99cdfc25aeb9bbe205ac6c3eb526e62130d98f497e9f
                                                • Instruction Fuzzy Hash: DC1126B6C003599FDB14CF9AD848ADEFBF4EB89324F14842ED515A7200C376A649CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 93 18d99e8-18da278 97 18da27a-18da27d 93->97 98 18da280-18da2af LoadLibraryExW 93->98 97->98 99 18da2b8-18da2d5 98->99 100 18da2b1-18da2b7 98->100 100->99
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018DA091,00000800,00000000,00000000), ref: 018DA2A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: aa0afcf42d7018a3729985eb445e316aea65296bbc58c215ab22a885866c3078
                                                • Instruction ID: 46bf2fa2df357f3d6e20be7023efd67cb251db26ffcae259df6d27b27a774651
                                                • Opcode Fuzzy Hash: aa0afcf42d7018a3729985eb445e316aea65296bbc58c215ab22a885866c3078
                                                • Instruction Fuzzy Hash: D61144B28003189FCB14CF9AD848ADEFBF4EB88324F10842AE519A7200C375A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 103 18d9fb0-18d9ff0 106 18d9ff8-18da023 GetModuleHandleW 103->106 107 18d9ff2-18d9ff5 103->107 108 18da02c-18da040 106->108 109 18da025-18da02b 106->109 107->106 109->108
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 018DA016
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: ff4545fbe96d62f860e4673b7d91eab519f3479be65514c6ba2888677cd0f2e7
                                                • Instruction ID: 1a938aa0ad36e729fd42e39c6b9b34f82170f65061e35211e1274c6c32f65ca1
                                                • Opcode Fuzzy Hash: ff4545fbe96d62f860e4673b7d91eab519f3479be65514c6ba2888677cd0f2e7
                                                • Instruction Fuzzy Hash: 5B11D2B5C00749CFDB24CF9AD844BDEFBF4AB89324F14851AD519A7600C375A649CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278022660.000000000187D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_187d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 483b8adf9580fbad070653516220b244e50d6babd32b222f38b60f88a55b6a62
                                                • Instruction ID: 3490da78ecf5f5e9295d11f832988c550d8a398b6b05a055a93467e6ef947e66
                                                • Opcode Fuzzy Hash: 483b8adf9580fbad070653516220b244e50d6babd32b222f38b60f88a55b6a62
                                                • Instruction Fuzzy Hash: 042128B1504204DFDB05CF54D9C4B66BB65FF84328F24C669D9098B206C336E946C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278053502.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_188d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 52a4539da3466723cdeb8a6064a82ec19fc0f7a5b302341487de474d31a530cc
                                                • Instruction ID: 439444504e43ad20c308e0e36d7de6490c5294d49bb525c61dcf1367329e4c76
                                                • Opcode Fuzzy Hash: 52a4539da3466723cdeb8a6064a82ec19fc0f7a5b302341487de474d31a530cc
                                                • Instruction Fuzzy Hash: D9213771508204DFDB15EFA4D9C4B26BB61FB84368F20CA6DD9498B386C336D947CA61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278053502.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_188d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 64c1540e6d17ea5c20030158145f15080b55038e731a021ec6de7481984fb11c
                                                • Instruction ID: 0f6dd7d14c6dee0b9d6d74589a5ace94e3635184748935f180bb326015ae808c
                                                • Opcode Fuzzy Hash: 64c1540e6d17ea5c20030158145f15080b55038e731a021ec6de7481984fb11c
                                                • Instruction Fuzzy Hash: CF212571504204DFDB01EF94D5C0B26BBA1FB84328F20CA6DD9098B282C336E946CA61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278022660.000000000187D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_187d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                                • Instruction ID: 7a39d2172b8a3be273231cd7a05ecf67e75986c0e2ff556ba1630335275287cf
                                                • Opcode Fuzzy Hash: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                                • Instruction Fuzzy Hash: 9A11DC72404280DFCB02CF44D9C0B56BF72FB84324F28C6A9D8094B617C33AE55ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278053502.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_188d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                                • Instruction ID: 34802ca6538f0bb91f9c104e590c1b3f83ac80505563b55a8068458f109eca97
                                                • Opcode Fuzzy Hash: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                                • Instruction Fuzzy Hash: 2111BE75504280DFCB12DF54C5C0B15BBB1FB84324F24C6A9D8498B696C33AE44ACB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278053502.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_188d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                                • Instruction ID: 90c9ab89cc7f931931c655ff264f358c221ed6ed4aafdbf819f14f88c58d978c
                                                • Opcode Fuzzy Hash: 4c71907b7ed15bb6a73651dcce162dc4bb009ed38cbefdc19058d3c3c88dcf41
                                                • Instruction Fuzzy Hash: D411BE75504280CFDB12DF54D5C4B15BBA1FB84314F24C6A9D8498B696C33AD54BCB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278022660.000000000187D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_187d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 198e64b9c0fc3237ee228ffac3f418692f71edf9985b206552bdc60895b98b52
                                                • Instruction ID: 453db8feb84008185ad466aa482c2578d2d3ab0efe5e53c933acbd59c7578f8c
                                                • Opcode Fuzzy Hash: 198e64b9c0fc3237ee228ffac3f418692f71edf9985b206552bdc60895b98b52
                                                • Instruction Fuzzy Hash: BE01F7710083849AE7114E59CD84B66FF98DF813B8F08C65AEE049A246C779D944C6B1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278022660.000000000187D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_187d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 69337cc8953e12e57a0c4e061134e417499858798f79ea88aee1367abfd94090
                                                • Instruction ID: ab7164fd3fa0d338561f9f45099e428b5f24ff615b81a8f80470668c4e731cbf
                                                • Opcode Fuzzy Hash: 69337cc8953e12e57a0c4e061134e417499858798f79ea88aee1367abfd94090
                                                • Instruction Fuzzy Hash: 08F06271404284AAE7118E59CD88B62FF98EF81774F18C55AEE089B286C379D944CAB1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 074e82b04e90b2e07cff1e4822cfdfcdb48bbd3afe37b0f355992b8b95342125
                                                • Instruction ID: fbf95a79c897cd08ee8bcd09ec900c38cfffe3f7d702f451cdb546d6018fa5ad
                                                • Opcode Fuzzy Hash: 074e82b04e90b2e07cff1e4822cfdfcdb48bbd3afe37b0f355992b8b95342125
                                                • Instruction Fuzzy Hash: CA12C9F1811746CBE310EF65F99C189BBA1F746328F70D228D2652BAD9D7B8114ACF84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c0b946a0f73fe9e84d893758782855c8f6506ee8a403387da7fbc21f3205f72
                                                • Instruction ID: 7269bc448edf4f3072792437ec59ead483f6b8bab84abf6378176d8f6d74de22
                                                • Opcode Fuzzy Hash: 4c0b946a0f73fe9e84d893758782855c8f6506ee8a403387da7fbc21f3205f72
                                                • Instruction Fuzzy Hash: 23A15E36E0071A9FCF05DFB9D8449DEBBB2FF84301B15816AE905EB261DB31AA55CB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.278137916.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18d0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 640045ca027b99c622a5b23a3cb8f1ada68ca52ff13a9946c36541cbb7e638e4
                                                • Instruction ID: 281a4548587b83ba64c718b98e5355ffcefc8fd058f94c9190dbb54b85ac3c2f
                                                • Opcode Fuzzy Hash: 640045ca027b99c622a5b23a3cb8f1ada68ca52ff13a9946c36541cbb7e638e4
                                                • Instruction Fuzzy Hash: EDC129B1811746CAE710EF65F98C199BBB1FB86328F70C328D2616B6D9D7B4144ACF84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.283419478.00000000077E0000.00000004.08000000.00040000.00000000.sdmp, Offset: 077E0000, based on PE: true
                                                • Associated: 00000000.00000002.283450110.00000000077F0000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_77e0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 27ecb2bbada0fa197ba3f6ebb65b840d343d8ab1bb8a13cbda03826acdf62af5
                                                • Instruction ID: 3331ebcd2be696f2865ee9f8f269afbad99e4bace95d121b7ed4b14a11053a20
                                                • Opcode Fuzzy Hash: 27ecb2bbada0fa197ba3f6ebb65b840d343d8ab1bb8a13cbda03826acdf62af5
                                                • Instruction Fuzzy Hash: 3951246254E7D18FC7138B789CB26D07FB0AE17224B5E45CBC0C1CF0A3E269995AD762
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce78df237b3a8992cdbcbd0fa366bb7fd97de0b5cbbffafc5ff72cc84acf6f12
                                                • Instruction ID: 25937dd1d36d5a3b8ce3fa4bd2eb2dc3e4196d77b29f8a3aa88b95d4e861287e
                                                • Opcode Fuzzy Hash: ce78df237b3a8992cdbcbd0fa366bb7fd97de0b5cbbffafc5ff72cc84acf6f12
                                                • Instruction Fuzzy Hash: 9601DA7B25206E2D23161D2B9C0ADE7771FF3D6626319436EA464C7541CE21A82A46E1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5cbff11a313984514ca3e74b79423793c6d3c4b1c58cfafff5bda6aa9b8589c0
                                                • Instruction ID: 1b3fcc1a5b263608617a119ea21e60ce28c884a658aff6e20868ccabc1cbbb25
                                                • Opcode Fuzzy Hash: 5cbff11a313984514ca3e74b79423793c6d3c4b1c58cfafff5bda6aa9b8589c0
                                                • Instruction Fuzzy Hash: 86F0F97B3950366D730609ABEC06CDF930BB2C89B73064536AA69CB681DF6098170AE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b17b3da307a719ae41495fe04d3e234adab7892b4f984f966fd2978b8f6b1653
                                                • Instruction ID: a7f7dbd8b7edcbd4e705570e5e955ee112d1dca211c55c482b2d95f071fd7bf5
                                                • Opcode Fuzzy Hash: b17b3da307a719ae41495fe04d3e234adab7892b4f984f966fd2978b8f6b1653
                                                • Instruction Fuzzy Hash: 69F0B07B39203E2D73062D1A5D06EF7A30FB3CA21A305527EA569C7642DF61591B05E1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 286e34843c94ac1d62b3d97014096ed1116d8e4c7c11cc4cfb05e8402a665e94
                                                • Instruction ID: 20337239d98c28fb05c23587bb78cd8c4621f2edd48e85f811613ea2cc12a90f
                                                • Opcode Fuzzy Hash: 286e34843c94ac1d62b3d97014096ed1116d8e4c7c11cc4cfb05e8402a665e94
                                                • Instruction Fuzzy Hash: CAF0A2B3808145F5271309779C08CB73D2B56E9BB117B936A7839EB8506EBA8813F560
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f8f5fcfc862a104ba4029f2bc8638bf6334d1baa3923bdafcfbdc46a35f17e39
                                                • Instruction ID: e17b5168b6d30faca8fab5ed926dadbfd3e725b4c630903d1f97bb4a2167f0b9
                                                • Opcode Fuzzy Hash: f8f5fcfc862a104ba4029f2bc8638bf6334d1baa3923bdafcfbdc46a35f17e39
                                                • Instruction Fuzzy Hash: 6A01F7B3544096F8272309679C08C573D2BA2ED7B133B433A78399B595EEB98813E1A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bc1474f2b50bc3f320c71d3f2eab81c655f5026dea309a5f3a2ec255acf37b97
                                                • Instruction ID: d39b1f93d7ce98fcb7f6690928015cc3b2b5a90080cd893ffbd48f2f34c28e4e
                                                • Opcode Fuzzy Hash: bc1474f2b50bc3f320c71d3f2eab81c655f5026dea309a5f3a2ec255acf37b97
                                                • Instruction Fuzzy Hash: 2CF0FFA9348191FE4723447BEC2CEC73C1795D97B033D02397C5197443FA9A8E15C950
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 28bc95c38097d73ddbc0da32f30e895189af898fdc165d265fd7d3702bdecd92
                                                • Instruction ID: 2ce3348e2222c9aa7edd32bec7737f31235e9faec7fb72b79c420e80c17b16c5
                                                • Opcode Fuzzy Hash: 28bc95c38097d73ddbc0da32f30e895189af898fdc165d265fd7d3702bdecd92
                                                • Instruction Fuzzy Hash: B4F0963E398166DE87529C7FFC2CA8F6616E5D197271C4637BE10C7083EA228917C9B0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.271859476.0000000000F12000.00000002.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                • Associated: 00000000.00000002.270801685.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_f10000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f76355e381a2ea839e7b8fb505e99b4bedc0f948530b5095bcafabcf88b7286
                                                • Instruction ID: 1a37ef57d51cb3684e12120ae94c387b2e13d083bb984b026e1ab7c77664a1e5
                                                • Opcode Fuzzy Hash: 3f76355e381a2ea839e7b8fb505e99b4bedc0f948530b5095bcafabcf88b7286
                                                • Instruction Fuzzy Hash: 6EF05A37A0C205C5230203FB6A0A563925612E36F1037C3200C3EFA8929CAB4813B480
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:10.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:58.5%
                                                Total number of Nodes:65
                                                Total number of Limit Nodes:1
                                                execution_graph 25325 5abb988 DuplicateHandle 25326 5abba1e 25325->25326 25327 18a3460 25328 18a347c 25327->25328 25329 18a3505 KiUserExceptionDispatcher 25328->25329 25356 18a6111 25329->25356 25330 18a3513 25360 18a83c9 25330->25360 25332 18a3604 25368 5fce6d8 25332->25368 25333 18a360b 25372 5fceb30 25333->25372 25334 18a3612 25376 5fcef88 25334->25376 25335 18a3619 25380 5fcf3e0 25335->25380 25336 18a3620 25384 5fcf838 25336->25384 25388 5fcf828 25336->25388 25337 18a3627 25392 5ab0007 25337->25392 25396 5ab0040 25337->25396 25338 18a3658 25400 5ab0498 25338->25400 25404 5ab048b 25338->25404 25339 18a365f 25408 5ab08e0 25339->25408 25412 5ab08f0 25339->25412 25340 18a3666 25357 18a6142 KiUserExceptionDispatcher 25356->25357 25359 18a61fe 25357->25359 25359->25330 25362 18a83fa 25360->25362 25361 18a3536 25364 5fce280 25361->25364 25362->25361 25363 18a8549 KiUserExceptionDispatcher 25362->25363 25363->25362 25365 5fce2a2 KiUserExceptionDispatcher 25364->25365 25367 5fce35c 25365->25367 25367->25332 25369 5fce6fa KiUserExceptionDispatcher 25368->25369 25371 5fce7b4 25369->25371 25371->25333 25373 5fceb52 KiUserExceptionDispatcher 25372->25373 25375 5fcec0c 25373->25375 25375->25334 25377 5fcefaa KiUserExceptionDispatcher 25376->25377 25379 5fcf064 25377->25379 25379->25335 25381 5fcf402 KiUserExceptionDispatcher 25380->25381 25383 5fcf4bc 25381->25383 25383->25336 25385 5fcf85a KiUserExceptionDispatcher 25384->25385 25387 5fcf914 25385->25387 25387->25337 25389 5fcf838 KiUserExceptionDispatcher 25388->25389 25391 5fcf914 25389->25391 25391->25337 25393 5ab003a KiUserExceptionDispatcher 25392->25393 25395 5ab011c 25393->25395 25395->25338 25397 5ab0062 KiUserExceptionDispatcher 25396->25397 25399 5ab011c 25397->25399 25399->25338 25401 5ab04ba KiUserExceptionDispatcher 25400->25401 25403 5ab0574 25401->25403 25403->25339 25405 5ab04ba KiUserExceptionDispatcher 25404->25405 25407 5ab0574 25405->25407 25407->25339 25409 5ab0912 KiUserExceptionDispatcher 25408->25409 25411 5ab09cc 25409->25411 25411->25340 25413 5ab0912 KiUserExceptionDispatcher 25412->25413 25415 5ab09cc 25413->25415 25415->25340 25416 18a5587 25417 18a55ba 25416->25417 25418 18a55bf LdrInitializeThunk 25416->25418 25417->25418 25419 18a5653 25418->25419

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 550 18a5587-18a55b8 551 18a55ba 550->551 552 18a55bf-18a564c LdrInitializeThunk 550->552 551->552 553 18a5653-18a571b 552->553 560 18a5fb4-18a5fd3 553->560 561 18a5fd9-18a600e 560->561 562 18a5720-18a572c 560->562 564 18a572e 562->564 565 18a5733-18a5799 562->565 564->565 569 18a579b 565->569 570 18a57a0-18a582d 565->570 569->570 576 18a583f-18a5846 570->576 577 18a582f-18a5836 570->577 580 18a5848 576->580 581 18a584d-18a585a 576->581 578 18a5838 577->578 579 18a583d 577->579 578->579 579->581 580->581 582 18a585c 581->582 583 18a5861-18a5868 581->583 582->583 584 18a586a 583->584 585 18a586f-18a58c6 583->585 584->585 588 18a58c8 585->588 589 18a58cd-18a58e4 585->589 588->589 590 18a58ef-18a58f7 589->590 591 18a58e6-18a58ed 589->591 592 18a58f8-18a5902 590->592 591->592 593 18a5909-18a5912 592->593 594 18a5904 592->594 595 18a5f84-18a5f8a 593->595 594->593 596 18a5f90-18a5faa 595->596 597 18a5917-18a5923 595->597 603 18a5fac 596->603 604 18a5fb1 596->604 598 18a592a-18a592f 597->598 599 18a5925 597->599 601 18a5972-18a5974 598->601 602 18a5931-18a593d 598->602 599->598 605 18a597a-18a598e 601->605 606 18a593f 602->606 607 18a5944-18a5949 602->607 603->604 604->560 609 18a5f62-18a5f6f 605->609 610 18a5994-18a59a9 605->610 606->607 607->601 608 18a594b-18a5958 607->608 611 18a595a 608->611 612 18a595f-18a5970 608->612 615 18a5f70-18a5f7a 609->615 613 18a59ab 610->613 614 18a59b0-18a5a30 610->614 611->612 612->605 613->614 622 18a5a5a 614->622 623 18a5a32-18a5a58 614->623 616 18a5f7c 615->616 617 18a5f81 615->617 616->617 617->595 624 18a5a64-18a5a78 622->624 623->624 626 18a5a7e-18a5a88 624->626 627 18a5bc1-18a5bc6 624->627 628 18a5a8a 626->628 629 18a5a8f-18a5aa9 626->629 630 18a5c2a-18a5c2c 627->630 631 18a5bc8-18a5be8 627->631 628->629 633 18a5aab-18a5ab5 629->633 634 18a5ac0-18a5ac2 629->634 632 18a5c32-18a5c46 630->632 646 18a5bea-18a5c10 631->646 647 18a5c12 631->647 636 18a5f5c-18a5f5d 632->636 637 18a5c4c-18a5c56 632->637 639 18a5abc-18a5abf 633->639 640 18a5ab7 633->640 635 18a5b4c-18a5b58 634->635 641 18a5b5a 635->641 642 18a5b5f-18a5b64 635->642 645 18a5f5e-18a5f60 636->645 643 18a5c58 637->643 644 18a5c5d-18a5c77 637->644 639->634 640->639 641->642 649 18a5b8b-18a5b8d 642->649 650 18a5b66-18a5b73 642->650 643->644 651 18a5c79-18a5c83 644->651 652 18a5c8e-18a5c9c 644->652 645->615 648 18a5c1c-18a5c28 646->648 647->648 648->632 656 18a5b93-18a5ba1 649->656 654 18a5b7a-18a5b89 650->654 655 18a5b75 650->655 657 18a5c8a-18a5c8d 651->657 658 18a5c85 651->658 659 18a5d2c-18a5d38 652->659 654->656 655->654 660 18a5ac7-18a5adc 656->660 661 18a5ba7-18a5bbc 656->661 657->652 658->657 662 18a5d3a 659->662 663 18a5d3f-18a5d44 659->663 664 18a5ade 660->664 665 18a5ae3-18a5b41 660->665 661->645 662->663 666 18a5d6b-18a5d6d 663->666 667 18a5d46-18a5d53 663->667 664->665 686 18a5b48-18a5b4b 665->686 687 18a5b43 665->687 670 18a5d73-18a5d87 666->670 668 18a5d5a-18a5d69 667->668 669 18a5d55 667->669 668->670 669->668 671 18a5d8d-18a5df9 call 18a43f8 * 2 670->671 672 18a5ca1-18a5cb9 670->672 684 18a5dfb-18a5dfd 671->684 685 18a5e02-18a5f58 671->685 675 18a5cbb 672->675 676 18a5cc0-18a5d21 672->676 675->676 691 18a5d28-18a5d2b 676->691 692 18a5d23 676->692 688 18a5f59-18a5f5a 684->688 685->688 686->635 687->686 688->596 691->659 692->691
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: e866b38eea7d074a7b6a5f303a47a32178e32b07e2798a2368685240c252c580
                                                • Instruction ID: 6ec9cae9aa4b18e496951a4d2d82b0d5ab7f859cfbab1d7d502ba06c0bbf984d
                                                • Opcode Fuzzy Hash: e866b38eea7d074a7b6a5f303a47a32178e32b07e2798a2368685240c252c580
                                                • Instruction Fuzzy Hash: 7962DF74E042688FEB64CF69C884BEDBBB2BB49304F5481A9D508A7355DB749EC1CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 705 18a83c9-18a83f8 706 18a83fa 705->706 707 18a83ff-18a84c2 call 18a66f8 call 18a6b88 705->707 706->707 716 18a84c8-18a84e0 707->716 717 18a87e0-18a8812 707->717 720 18a84e2 716->720 721 18a84e7-18a84f0 716->721 720->721 722 18a87d3-18a87d9 721->722 723 18a87df 722->723 724 18a84f5-18a856f KiUserExceptionDispatcher 722->724 723->717 728 18a862b-18a8686 724->728 729 18a8575-18a85e3 724->729 740 18a8687-18a86d5 call 18a43f8 * 2 728->740 738 18a8626-18a8629 729->738 739 18a85e5-18a8625 729->739 738->740 739->738 747 18a86db-18a87bd 740->747 748 18a87be-18a87c9 740->748 747->748 749 18a87cb 748->749 750 18a87d0 748->750 749->750 750->722
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 018A855B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 89015fee02d2ec45b1a4e9dd49d3d629af36873d572a6f6592dfd73bcab662af
                                                • Instruction ID: eeb9ccd05341cb2545c3f3369d42fb1c6849737b240cce315f78e269e69d2933
                                                • Opcode Fuzzy Hash: 89015fee02d2ec45b1a4e9dd49d3d629af36873d572a6f6592dfd73bcab662af
                                                • Instruction Fuzzy Hash: 19D1A174E00218CFEB14DFA5D998B9DBBB2FB89304F2081A9D809AB354DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 763 18a6111-18a6140 764 18a6142 763->764 765 18a6147-18a620c KiUserExceptionDispatcher 763->765 764->765 771 18a652a-18a655c 765->771 772 18a6212-18a622a 765->772 775 18a622c 772->775 776 18a6231-18a623a 772->776 775->776 777 18a651d-18a6523 776->777 778 18a6529 777->778 779 18a623f-18a62b9 777->779 778->771 784 18a62bf-18a632d 779->784 785 18a6375-18a63d0 779->785 794 18a632f-18a636f 784->794 795 18a6370-18a6373 784->795 796 18a63d1-18a641f call 18a43f8 * 2 785->796 794->795 795->796 803 18a6508-18a6513 796->803 804 18a6425-18a6507 796->804 806 18a651a 803->806 807 18a6515 803->807 804->803 806->777 807->806
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 018A61EC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 1947fb09b70ffc8e75232d6b163f2577325beac7a79090636909d262d643cb36
                                                • Instruction ID: abc4dc9ccdc5c5f3ad376f17ef9d1f53b193aeaca71f5e313b2abe0b2dd1d7bd
                                                • Opcode Fuzzy Hash: 1947fb09b70ffc8e75232d6b163f2577325beac7a79090636909d262d643cb36
                                                • Instruction Fuzzy Hash: 9AD1B074E00218CFEB14DFA5D948B9DBBB2FB89304F2480A9D809AB355DB359E85CF11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 874 5ab0498-5ab04b8 875 5ab04ba 874->875 876 5ab04bf-5ab056c KiUserExceptionDispatcher 874->876 875->876 881 5ab0574-5ab0582 876->881 882 5ab089a-5ab08cc 881->882 883 5ab0588-5ab059f 881->883 886 5ab05a1 883->886 887 5ab05a6-5ab05af 883->887 886->887 888 5ab088d-5ab0893 887->888 889 5ab0899 888->889 890 5ab05b4-5ab062a 888->890 889->882 895 5ab0630-5ab069e 890->895 896 5ab06e6-5ab0740 890->896 905 5ab06e1-5ab06e4 895->905 906 5ab06a0-5ab06e0 895->906 907 5ab0741-5ab078f 896->907 905->907 906->905 912 5ab0878-5ab0883 907->912 913 5ab0795-5ab0877 907->913 915 5ab088a 912->915 916 5ab0885 912->916 913->912 915->888 916->915
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB0563
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: c89aca2429bff9879977053f1512d57b2b877652fde700a7e7b4e3b702fae6ac
                                                • Instruction ID: 1298f264ab7360bdfd20ef6a8399d68158cc64da1ec3bbd9f2d8821d4558b286
                                                • Opcode Fuzzy Hash: c89aca2429bff9879977053f1512d57b2b877652fde700a7e7b4e3b702fae6ac
                                                • Instruction Fuzzy Hash: 41C1B074E00218CFEB14DFA5C958BADBBB2FB89304F2080A9D409AB355DB755E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 819 5ab0040-5ab0060 820 5ab0062 819->820 821 5ab0067-5ab0114 KiUserExceptionDispatcher 819->821 820->821 827 5ab011c-5ab012a 821->827 828 5ab0442-5ab0474 827->828 829 5ab0130-5ab0147 827->829 832 5ab0149 829->832 833 5ab014e-5ab0157 829->833 832->833 834 5ab0435-5ab043b 833->834 835 5ab015c-5ab01d2 834->835 836 5ab0441 834->836 841 5ab01d8-5ab0246 835->841 842 5ab028e-5ab02e8 835->842 836->828 851 5ab0289-5ab028c 841->851 852 5ab0248-5ab0288 841->852 853 5ab02e9-5ab0337 842->853 851->853 852->851 858 5ab033d-5ab041f 853->858 859 5ab0420-5ab042b 853->859 858->859 860 5ab042d 859->860 861 5ab0432 859->861 860->861 861->834
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB010B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 30fe721916dda0dd3afc8e5f7bcb43297b5941f36698d52c503bcab51e211f17
                                                • Instruction ID: ba5372c560f55aa5e5183ffb223a05d7c4af8cc529e3add403914ea12e6ede9c
                                                • Opcode Fuzzy Hash: 30fe721916dda0dd3afc8e5f7bcb43297b5941f36698d52c503bcab51e211f17
                                                • Instruction Fuzzy Hash: ADC1AF74E002188FEB14DFA5C958BADBBB2FB89304F2080A9D809AB355DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 928 5ab08f0-5ab0910 929 5ab0912 928->929 930 5ab0917-5ab09c4 KiUserExceptionDispatcher 928->930 929->930 935 5ab09cc-5ab09da 930->935 936 5ab0cf2-5ab0d24 935->936 937 5ab09e0-5ab09f7 935->937 940 5ab09f9 937->940 941 5ab09fe-5ab0a07 937->941 940->941 942 5ab0ce5-5ab0ceb 941->942 943 5ab0a0c-5ab0a82 942->943 944 5ab0cf1 942->944 949 5ab0a88-5ab0af6 943->949 950 5ab0b3e-5ab0b98 943->950 944->936 959 5ab0b39-5ab0b3c 949->959 960 5ab0af8-5ab0b38 949->960 961 5ab0b99-5ab0be7 950->961 959->961 960->959 966 5ab0bed-5ab0ccf 961->966 967 5ab0cd0-5ab0cdb 961->967 966->967 968 5ab0cdd 967->968 969 5ab0ce2 967->969 968->969 969->942
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB09BB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 0337b6512d318a966c5536ba19e302d643a9f532526cbd915e436d282e1552ad
                                                • Instruction ID: a3ef106afa711e40810dbde1d018b463005530255b5afc0dd57aad782d8be8c0
                                                • Opcode Fuzzy Hash: 0337b6512d318a966c5536ba19e302d643a9f532526cbd915e436d282e1552ad
                                                • Instruction Fuzzy Hash: FDC1B074E00218CFEB14DFA5C958BADBBB2FB89304F2080A9D809AB355DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1222 5fcf3e0-5fcf400 1223 5fcf407-5fcf4ca KiUserExceptionDispatcher 1222->1223 1224 5fcf402 1222->1224 1230 5fcf4d0-5fcf4e7 call 5fc2958 1223->1230 1231 5fcf7e2-5fcf814 1223->1231 1224->1223 1235 5fcf4ee-5fcf4f7 1230->1235 1236 5fcf4e9 1230->1236 1237 5fcf7d5-5fcf7db 1235->1237 1236->1235 1238 5fcf4fc-5fcf572 call 5fc2ad8 * 3 call 5fc2fd8 1237->1238 1239 5fcf7e1 1237->1239 1248 5fcf62e-5fcf688 call 5fc2ad8 1238->1248 1249 5fcf578-5fcf5e6 1238->1249 1239->1231 1261 5fcf689-5fcf6d7 1248->1261 1259 5fcf5e8-5fcf628 1249->1259 1260 5fcf629-5fcf62c 1249->1260 1259->1260 1260->1261 1266 5fcf6dd-5fcf7bf 1261->1266 1267 5fcf7c0-5fcf7cb 1261->1267 1266->1267 1268 5fcf7cd 1267->1268 1269 5fcf7d2 1267->1269 1268->1269 1269->1237
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCF4AB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 5e2e433344e204f9f256471819f32aade3b589cfa706ed64a31b6cb7ae3d9439
                                                • Instruction ID: 52aba8f8611de7353d3406becee3a1f966232b6f659fee9e8c3e426b3ec62a66
                                                • Opcode Fuzzy Hash: 5e2e433344e204f9f256471819f32aade3b589cfa706ed64a31b6cb7ae3d9439
                                                • Instruction Fuzzy Hash: A6C19F74E002198FDB18DFA5C954BADBBB2FF89304F2081A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1162 5fcef88-5fcefa8 1163 5fcefaf-5fcf072 KiUserExceptionDispatcher 1162->1163 1164 5fcefaa 1162->1164 1170 5fcf078-5fcf08f call 5fc2958 1163->1170 1171 5fcf38a-5fcf3bc 1163->1171 1164->1163 1175 5fcf096-5fcf09f 1170->1175 1176 5fcf091 1170->1176 1177 5fcf37d-5fcf383 1175->1177 1176->1175 1178 5fcf389 1177->1178 1179 5fcf0a4-5fcf11a call 5fc2ad8 * 3 call 5fc2fd8 1177->1179 1178->1171 1188 5fcf1d6-5fcf230 call 5fc2ad8 1179->1188 1189 5fcf120-5fcf18e 1179->1189 1201 5fcf231-5fcf27f 1188->1201 1199 5fcf190-5fcf1d0 1189->1199 1200 5fcf1d1-5fcf1d4 1189->1200 1199->1200 1200->1201 1206 5fcf368-5fcf373 1201->1206 1207 5fcf285-5fcf367 1201->1207 1209 5fcf37a 1206->1209 1210 5fcf375 1206->1210 1207->1206 1209->1177 1210->1209
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCF053
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 3d0ed15dbdaf20c7867543789ec41ea0eb2028c46c575ec470c5b93f3291e94e
                                                • Instruction ID: 8b3b56dcf95c8d41ad2a3b4c7eeb8207cac659d43d61d821aa923d9249b417b5
                                                • Opcode Fuzzy Hash: 3d0ed15dbdaf20c7867543789ec41ea0eb2028c46c575ec470c5b93f3291e94e
                                                • Instruction Fuzzy Hash: E4C19074E002198FDB18DFA5C954BADBBB2FB89304F2080A9D809AB355DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1102 5fceb30-5fceb50 1103 5fceb57-5fcec1a KiUserExceptionDispatcher 1102->1103 1104 5fceb52 1102->1104 1110 5fcec20-5fcec37 call 5fc2958 1103->1110 1111 5fcef32-5fcef64 1103->1111 1104->1103 1115 5fcec3e-5fcec47 1110->1115 1116 5fcec39 1110->1116 1117 5fcef25-5fcef2b 1115->1117 1116->1115 1118 5fcec4c-5fcecc2 call 5fc2ad8 * 3 call 5fc2fd8 1117->1118 1119 5fcef31 1117->1119 1128 5fced7e-5fcedd8 call 5fc2ad8 1118->1128 1129 5fcecc8-5fced36 1118->1129 1119->1111 1141 5fcedd9-5fcee27 1128->1141 1139 5fced38-5fced78 1129->1139 1140 5fced79-5fced7c 1129->1140 1139->1140 1140->1141 1146 5fcee2d-5fcef0f 1141->1146 1147 5fcef10-5fcef1b 1141->1147 1146->1147 1148 5fcef1d 1147->1148 1149 5fcef22 1147->1149 1148->1149 1149->1117
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCEBFB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 14eca5407c38dea51edf7ddf8fa37f3e3e6b745550a083f2af6178c5f9b6363e
                                                • Instruction ID: 696efad27c1e3deb9e3ba83837f3672f06dd7eee110db5d30b9c7863ca5953b4
                                                • Opcode Fuzzy Hash: 14eca5407c38dea51edf7ddf8fa37f3e3e6b745550a083f2af6178c5f9b6363e
                                                • Instruction Fuzzy Hash: A3C1AF74E00219CFEB14DFA5C954BADBBB2FB89304F2080A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1042 5fce6d8-5fce6f8 1043 5fce6ff-5fce7c2 KiUserExceptionDispatcher 1042->1043 1044 5fce6fa 1042->1044 1050 5fce7c8-5fce7df call 5fc2958 1043->1050 1051 5fceada-5fceb0c 1043->1051 1044->1043 1055 5fce7e6-5fce7ef 1050->1055 1056 5fce7e1 1050->1056 1057 5fceacd-5fcead3 1055->1057 1056->1055 1058 5fcead9 1057->1058 1059 5fce7f4-5fce86a call 5fc2ad8 * 3 call 5fc2fd8 1057->1059 1058->1051 1068 5fce926-5fce980 call 5fc2ad8 1059->1068 1069 5fce870-5fce8de 1059->1069 1079 5fce981-5fce9cf 1068->1079 1080 5fce8e0-5fce920 1069->1080 1081 5fce921-5fce924 1069->1081 1086 5fceab8-5fceac3 1079->1086 1087 5fce9d5-5fceab7 1079->1087 1080->1081 1081->1079 1089 5fceaca 1086->1089 1090 5fceac5 1086->1090 1087->1086 1089->1057 1090->1089
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCE7A3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 141addf576f8ddf46a044c0214e086d3718883075e017cfda422c79008a8d2e9
                                                • Instruction ID: fdc978f9a6c3d1d075f3bea563c7b19976499b32139a2f7339ad819dd3af8c19
                                                • Opcode Fuzzy Hash: 141addf576f8ddf46a044c0214e086d3718883075e017cfda422c79008a8d2e9
                                                • Instruction Fuzzy Hash: 4DC19F74E002198FEB14DFA5C954BADBBB2FB89304F2080A9D809AB355DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 982 5fce280-5fce2a0 983 5fce2a7-5fce36a KiUserExceptionDispatcher 982->983 984 5fce2a2 982->984 990 5fce370-5fce387 call 5fc2958 983->990 991 5fce682-5fce6b4 983->991 984->983 995 5fce38e-5fce397 990->995 996 5fce389 990->996 997 5fce675-5fce67b 995->997 996->995 998 5fce39c-5fce412 call 5fc2ad8 * 3 call 5fc2fd8 997->998 999 5fce681 997->999 1008 5fce4ce-5fce528 call 5fc2ad8 998->1008 1009 5fce418-5fce486 998->1009 999->991 1021 5fce529-5fce577 1008->1021 1019 5fce488-5fce4c8 1009->1019 1020 5fce4c9-5fce4cc 1009->1020 1019->1020 1020->1021 1026 5fce57d-5fce65f 1021->1026 1027 5fce660-5fce66b 1021->1027 1026->1027 1028 5fce66d 1027->1028 1029 5fce672 1027->1029 1028->1029 1029->997
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCE34B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: e807e6da1a923232e457ad011a4089b1c83a4b286385a959e36ef4861a8b507a
                                                • Instruction ID: d234ef0f8830a6afb13566fa5214de2fae63935c1be50a658ed1e3de51298ff4
                                                • Opcode Fuzzy Hash: e807e6da1a923232e457ad011a4089b1c83a4b286385a959e36ef4861a8b507a
                                                • Instruction Fuzzy Hash: 85C1AF74E00218CFDB24DFA5C954BADBBB2FB89304F2081A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1282 5fcf838-5fcf858 1283 5fcf85f-5fcf90c KiUserExceptionDispatcher 1282->1283 1284 5fcf85a 1282->1284 1289 5fcf914-5fcf922 1283->1289 1284->1283 1290 5fcf928-5fcf93f call 5fc2958 1289->1290 1291 5fcfc3a-5fcfc6c 1289->1291 1295 5fcf946-5fcf94f 1290->1295 1296 5fcf941 1290->1296 1297 5fcfc2d-5fcfc33 1295->1297 1296->1295 1298 5fcfc39 1297->1298 1299 5fcf954-5fcf9ca call 5fc2ad8 * 3 call 5fc2fd8 1297->1299 1298->1291 1308 5fcfa86-5fcfae0 call 5fc2ad8 1299->1308 1309 5fcf9d0-5fcfa3e 1299->1309 1321 5fcfae1-5fcfb2f 1308->1321 1319 5fcfa40-5fcfa80 1309->1319 1320 5fcfa81-5fcfa84 1309->1320 1319->1320 1320->1321 1326 5fcfc18-5fcfc23 1321->1326 1327 5fcfb35-5fcfc17 1321->1327 1329 5fcfc2a 1326->1329 1330 5fcfc25 1326->1330 1327->1326 1329->1297 1330->1329
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCF903
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 68f6f1ff0c6998da8c182f3b7f7ad4b0361368fc103074b5bcb71e03296a5216
                                                • Instruction ID: 7742c35d6cf03aa493b9723d680ff3561e0171ae2d1eae3e5449640c24e10965
                                                • Opcode Fuzzy Hash: 68f6f1ff0c6998da8c182f3b7f7ad4b0361368fc103074b5bcb71e03296a5216
                                                • Instruction Fuzzy Hash: 01C1A074E00219CFDB14DFA5C994BADBBB2FB89304F2080A9D809AB355DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1624 5ab0007-5ab0038 1625 5ab003a-5ab0060 1624->1625 1626 5ab0085-5ab0114 KiUserExceptionDispatcher 1624->1626 1627 5ab0062 1625->1627 1628 5ab0067-5ab0082 1625->1628 1633 5ab011c-5ab012a 1626->1633 1627->1628 1628->1626 1634 5ab0442-5ab0474 1633->1634 1635 5ab0130-5ab0147 1633->1635 1638 5ab0149 1635->1638 1639 5ab014e-5ab0157 1635->1639 1638->1639 1640 5ab0435-5ab043b 1639->1640 1641 5ab015c-5ab01d2 1640->1641 1642 5ab0441 1640->1642 1647 5ab01d8-5ab0246 1641->1647 1648 5ab028e-5ab02e8 1641->1648 1642->1634 1657 5ab0289-5ab028c 1647->1657 1658 5ab0248-5ab0288 1647->1658 1659 5ab02e9-5ab0337 1648->1659 1657->1659 1658->1657 1664 5ab033d-5ab041f 1659->1664 1665 5ab0420-5ab042b 1659->1665 1664->1665 1666 5ab042d 1665->1666 1667 5ab0432 1665->1667 1666->1667 1667->1640
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB010B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 915980049467fc4bc4848722dd7b702646b9ad73529fb6dd7836adcbed1c768f
                                                • Instruction ID: d6ac2d4403cd9b88539980f1d3312a6521710bcb1b71c054fee68ed9e44c04a8
                                                • Opcode Fuzzy Hash: 915980049467fc4bc4848722dd7b702646b9ad73529fb6dd7836adcbed1c768f
                                                • Instruction Fuzzy Hash: 96412770D052488FEB19CFBAD9547DEBBB2BF89300F28C16AC414AB256DB344946CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05FCF903
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 656971d218db7a2c75709e847d3d365b2799eae23763de21a2a93112632dc5ff
                                                • Instruction ID: d7c965a2211873e0b7455f6166a86d8a1686a00899aed00950e5dc26694035a2
                                                • Opcode Fuzzy Hash: 656971d218db7a2c75709e847d3d365b2799eae23763de21a2a93112632dc5ff
                                                • Instruction Fuzzy Hash: C541E5B1E002498BDB18DFAAD5546AEFBF2BF89300F20C17DC415AB258DB355945CF44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB09BB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 2cea312f9dacd1f7f1e5b0915c2d1c4d617c53b34cbdeb9dfdb74f5411535d7c
                                                • Instruction ID: 14786e01dfe2618d9d5a93e22187221a13f7fa8f8e7c2fcae1a7e668b289d272
                                                • Opcode Fuzzy Hash: 2cea312f9dacd1f7f1e5b0915c2d1c4d617c53b34cbdeb9dfdb74f5411535d7c
                                                • Instruction Fuzzy Hash: AD41E2B0E012488BEB18CFAAD554AEEFBF2BF89304F24C12AC415BB259DB345945CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05AB0563
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: f097dcc6736ef31f773c3b6cf4da87979b1a273067d66c1e05f44860cad016e4
                                                • Instruction ID: 0f67d2a6b4bcf846728f0679a3c9841d7519af9ee09af7b883d5c925e1aacdbf
                                                • Opcode Fuzzy Hash: f097dcc6736ef31f773c3b6cf4da87979b1a273067d66c1e05f44860cad016e4
                                                • Instruction Fuzzy Hash: 0E41D5B1E01248CBEB18DFAAD554AEEBBF2BF88300F24D129C414BB259DB355946CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7178ac6fbe041e9e234d1f03ba561ca849a5517c4baf7bccae9fd2308b93062c
                                                • Instruction ID: 6e8a73004a956de82af0c7a76fbece85b6520210c6b336f5a5e5ed0338437572
                                                • Opcode Fuzzy Hash: 7178ac6fbe041e9e234d1f03ba561ca849a5517c4baf7bccae9fd2308b93062c
                                                • Instruction Fuzzy Hash: 43125534E002188FEB24DFB8C9947ADBBB2EF89304F5084A9C509AB395DB349E45CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48990eb7cc3fea74e71235dbe811d775f4eb8a2a739bc4534a94b444dd42b26a
                                                • Instruction ID: daca518669c3d8389d1546a9c043dd752bd1ddc3b2ea1a3c5b201c70ade3d6b7
                                                • Opcode Fuzzy Hash: 48990eb7cc3fea74e71235dbe811d775f4eb8a2a739bc4534a94b444dd42b26a
                                                • Instruction Fuzzy Hash: 51F1F574E00218CFEB14DFA9C884B9DFBB2BF88304F5581A9D908AB355DB759A85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e24d6da44a237d69fe76bf3eab6a92714ed0ecb5e78fe52dd262d077589b25ef
                                                • Instruction ID: 634d36c36c2842ceefa6ae85c8ecce9c948f318585159ae9d552cc4521b5f897
                                                • Opcode Fuzzy Hash: e24d6da44a237d69fe76bf3eab6a92714ed0ecb5e78fe52dd262d077589b25ef
                                                • Instruction Fuzzy Hash: 49D1E174E00258CFEB14DFA5D958BADBBB2FF49304F2080A9D809AB355DB356A81DF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d3eae3646bbed31a4dcd9b99a89dd12474e50af0ebf026a2db5917a31b8109e7
                                                • Instruction ID: 5e98b46902762a7d45989f083a4ad128113af09f4b3fabafb2891b32e6b6a8f0
                                                • Opcode Fuzzy Hash: d3eae3646bbed31a4dcd9b99a89dd12474e50af0ebf026a2db5917a31b8109e7
                                                • Instruction Fuzzy Hash: 73D1A174E00218CFEB14DFA5D958BADBBB2FB89304F1081A9D809AB354DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11f04d71f99437e780a8136879ad2c6904aa31ea99c05578a391a65e38ce64e1
                                                • Instruction ID: 5a55ee3278ca1815ab8f9528d39ce1f6153491c84523fa24392723d595f6f2eb
                                                • Opcode Fuzzy Hash: 11f04d71f99437e780a8136879ad2c6904aa31ea99c05578a391a65e38ce64e1
                                                • Instruction Fuzzy Hash: F5D1B074E00218CFEB14DFA5D948B9DBBB2FB89304F2081A9D809AB355DB356E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a62dec154c66a3f54666a7f1794e4edee5757066965659aaf6c331626dd63256
                                                • Instruction ID: 7467d106e96060309d245e289960b1fa5a680c12ba8f7d9842ccb9cf45781038
                                                • Opcode Fuzzy Hash: a62dec154c66a3f54666a7f1794e4edee5757066965659aaf6c331626dd63256
                                                • Instruction Fuzzy Hash: E0C1CF74E00218CFEB14DFA5C994B9DBBB2FB89304F2080A9D909AB354DB359E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4404823edbd2a2db560a4d443e6ac293237ad6bc23000ae5bacf2f4acb5bc355
                                                • Instruction ID: fa7d02811448a930442c619586ce2da72ce11002ece9c976b045c238846fa608
                                                • Opcode Fuzzy Hash: 4404823edbd2a2db560a4d443e6ac293237ad6bc23000ae5bacf2f4acb5bc355
                                                • Instruction Fuzzy Hash: 42C1C074E00218CFEB24DFA5C994B9DBBB2FB89304F2080A9D809AB354DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a2d51b051b88f82a904cf805cc4f76ee39526437b92787e9baa60e9bcff1a3a
                                                • Instruction ID: 78b100d5a4de85c06e87b247dfad65f80c7084f29cbdfc580e9902a21e09078a
                                                • Opcode Fuzzy Hash: 0a2d51b051b88f82a904cf805cc4f76ee39526437b92787e9baa60e9bcff1a3a
                                                • Instruction Fuzzy Hash: E5C1CF74E002188FEB14DFA5C954BADBBB2FF89304F2080A9D809AB355DB346E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 894c7e8e18927c90be7fa6cf2ddac86ecdde58a6d71a312a647365f62ffd3110
                                                • Instruction ID: 87deb95d788713c876219b7d14d8b7a8dc42f03d495ec72a1f27e336089e7f7d
                                                • Opcode Fuzzy Hash: 894c7e8e18927c90be7fa6cf2ddac86ecdde58a6d71a312a647365f62ffd3110
                                                • Instruction Fuzzy Hash: 35C1BF74E00218CFEB14DFA5C994B9DBBB2FB89304F6080A9D809AB355DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4394da3c05cefac40240bc3de7bcec92150008881c1614a60cf4fa8017947d64
                                                • Instruction ID: 11013a13fe67dc39ecbfac3222b16993d0e2e536808af3ce31c7937ff2610973
                                                • Opcode Fuzzy Hash: 4394da3c05cefac40240bc3de7bcec92150008881c1614a60cf4fa8017947d64
                                                • Instruction Fuzzy Hash: F4D1BF74E00218CFEB14DFA5D958BADBBB2FB89304F2080A9D809AB355DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c4e72f221d011406cccf4fc6743232614b5c8bc7354b7e9fada44bd7c9def7f8
                                                • Instruction ID: 36c56c2d8e5025b1977b4538fbdb04e56840618e48fb28d4fb8bd2a3982c1892
                                                • Opcode Fuzzy Hash: c4e72f221d011406cccf4fc6743232614b5c8bc7354b7e9fada44bd7c9def7f8
                                                • Instruction Fuzzy Hash: 79A11470D002188FEB10DFA9C588BDDBBB1FF89304F248269D509AB395EB759A85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 22f29e2ecd70d29f9e5991d07965a9eb229c6a38b1d88ab6897df2f642a4dd1c
                                                • Instruction ID: 8deb84f2b14035e8a4d8ea2ae0b54482ee2865142f496953aa53f212d9ac9510
                                                • Opcode Fuzzy Hash: 22f29e2ecd70d29f9e5991d07965a9eb229c6a38b1d88ab6897df2f642a4dd1c
                                                • Instruction Fuzzy Hash: 7EA10270D002188FEB10DFA8C548BEDBBB1FF89304F248269D508AB395EB759A85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21f4739b23b9271a94316844ea821dd69dadda546e663a2f5cb4951947dad15e
                                                • Instruction ID: 319a7475ed2572a4136697714543b73b12b9a30c16869ea08eb469eed8a96fff
                                                • Opcode Fuzzy Hash: 21f4739b23b9271a94316844ea821dd69dadda546e663a2f5cb4951947dad15e
                                                • Instruction Fuzzy Hash: DD91F470900218CFEB10DFA8C498BEDBBB1FF49314F248269D509AB395EB759A85CF15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1342 18a3450-18a347a 1343 18a347c 1342->1343 1344 18a3481-18a34e2 1342->1344 1343->1344 1358 18a34e9 1344->1358 1467 18a34ea call 18a392a 1358->1467 1468 18a34ea call 18a3994 1358->1468 1359 18a34f0-18a34f7 1361 18a34fe-18a3513 call 18a4859 KiUserExceptionDispatcher call 18a6111 1359->1361 1477 18a3514 call 18a7248 1361->1477 1478 18a3514 call 18a7200 1361->1478 1364 18a351a-18a35d0 call 18a76a8 call 18a7b08 call 18a7f68 call 18a83c9 1391 18a35d7-18a35da 1364->1391 1392 18a35e1-18a35ef 1391->1392 1395 18a35f6 1392->1395 1396 18a35fd-18a3620 call 5fce280 call 5fce6d8 call 5fceb30 call 5fcef88 call 5fcf3e0 1395->1396 1432 18a3621 call 5fcf838 1396->1432 1433 18a3621 call 5fcf828 1396->1433 1402 18a3627 1403 18a362e-18a3651 call 18ae758 call 18aee28 call 18af280 call 18af6d8 call 18afb30 1402->1403 1439 18a3652 call 5ab0040 1403->1439 1440 18a3652 call 5ab0007 1403->1440 1409 18a3658 1441 18a3659 call 5ab048b 1409->1441 1442 18a3659 call 5ab0498 1409->1442 1410 18a365f 1443 18a3660 call 5ab08e0 1410->1443 1444 18a3660 call 5ab08f0 1410->1444 1411 18a3666 1445 18a3667 call 5ab0d38 1411->1445 1446 18a3667 call 5ab0d48 1411->1446 1412 18a366d 1447 18a366e call 5ab16e9 1412->1447 1448 18a366e call 5ab16f8 1412->1448 1413 18a3674 1449 18a3675 call 5ab1d38 1413->1449 1450 18a3675 call 5ab1d48 1413->1450 1414 18a367b 1451 18a367c call 5ab2388 1414->1451 1452 18a367c call 5ab2398 1414->1452 1415 18a3682 1453 18a3683 call 5ab29cf 1415->1453 1454 18a3683 call 5ab29e0 1415->1454 1416 18a3689 1455 18a368a call 5ab3028 1416->1455 1456 18a368a call 5ab3018 1416->1456 1417 18a3690 1457 18a3691 call 5ab3668 1417->1457 1458 18a3691 call 5ab3678 1417->1458 1418 18a3697 1459 18a3698 call 5ab3cb9 1418->1459 1460 18a3698 call 5ab3cc8 1418->1460 1419 18a369e 1461 18a369f call 5ab4309 1419->1461 1462 18a369f call 5ab4318 1419->1462 1420 18a36a5 1463 18a36a6 call 5ab4959 1420->1463 1464 18a36a6 call 5ab4968 1420->1464 1421 18a36ac 1465 18a36ad call 5ab4f9f 1421->1465 1466 18a36ad call 5ab4fb0 1421->1466 1422 18a36b3 1423 18a36ba 1422->1423 1469 18a36bb call 5ab5628 1423->1469 1470 18a36bb call 5ab5618 1423->1470 1424 18a36c1 1471 18a36c2 call 5aba648 1424->1471 1472 18a36c2 call 5aba658 1424->1472 1473 18a36c2 call 5aba6a0 1424->1473 1474 18a36c2 call 5aba690 1424->1474 1425 18a36c8-18a36f3 1432->1402 1433->1402 1439->1409 1440->1409 1441->1410 1442->1410 1443->1411 1444->1411 1445->1412 1446->1412 1447->1413 1448->1413 1449->1414 1450->1414 1451->1415 1452->1415 1453->1416 1454->1416 1455->1417 1456->1417 1457->1418 1458->1418 1459->1419 1460->1419 1461->1420 1462->1420 1463->1421 1464->1421 1465->1422 1466->1422 1467->1359 1468->1359 1469->1424 1470->1424 1471->1425 1472->1425 1473->1425 1474->1425 1477->1364 1478->1364
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 018A3506
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: de1dd0b2563bd7991bb6faf44d5637fec5324727b6257321986a1a03d7127ef7
                                                • Instruction ID: f719849cffe4dc808ab454bb820d382b0d9090a11de8064c71167f09637a45aa
                                                • Opcode Fuzzy Hash: de1dd0b2563bd7991bb6faf44d5637fec5324727b6257321986a1a03d7127ef7
                                                • Instruction Fuzzy Hash: CF51EC34435746EFD7207F64F6AD16EBBB1FB5F313745AC00A41A91819EB38528AAF20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1483 18a3460-18a347a 1484 18a347c 1483->1484 1485 18a3481-18a34e9 1483->1485 1484->1485 1590 18a34ea call 18a392a 1485->1590 1591 18a34ea call 18a3994 1485->1591 1500 18a34f0-18a3513 call 18a4859 KiUserExceptionDispatcher call 18a6111 1600 18a3514 call 18a7248 1500->1600 1601 18a3514 call 18a7200 1500->1601 1505 18a351a-18a3620 call 18a76a8 call 18a7b08 call 18a7f68 call 18a83c9 call 5fce280 call 5fce6d8 call 5fceb30 call 5fcef88 call 5fcf3e0 1611 18a3621 call 5fcf838 1505->1611 1612 18a3621 call 5fcf828 1505->1612 1543 18a3627-18a3651 call 18ae758 call 18aee28 call 18af280 call 18af6d8 call 18afb30 1618 18a3652 call 5ab0040 1543->1618 1619 18a3652 call 5ab0007 1543->1619 1550 18a3658 1620 18a3659 call 5ab048b 1550->1620 1621 18a3659 call 5ab0498 1550->1621 1551 18a365f 1622 18a3660 call 5ab08e0 1551->1622 1623 18a3660 call 5ab08f0 1551->1623 1552 18a3666 1568 18a3667 call 5ab0d38 1552->1568 1569 18a3667 call 5ab0d48 1552->1569 1553 18a366d 1570 18a366e call 5ab16e9 1553->1570 1571 18a366e call 5ab16f8 1553->1571 1554 18a3674 1572 18a3675 call 5ab1d38 1554->1572 1573 18a3675 call 5ab1d48 1554->1573 1555 18a367b 1574 18a367c call 5ab2388 1555->1574 1575 18a367c call 5ab2398 1555->1575 1556 18a3682 1576 18a3683 call 5ab29cf 1556->1576 1577 18a3683 call 5ab29e0 1556->1577 1557 18a3689 1578 18a368a call 5ab3028 1557->1578 1579 18a368a call 5ab3018 1557->1579 1558 18a3690 1580 18a3691 call 5ab3668 1558->1580 1581 18a3691 call 5ab3678 1558->1581 1559 18a3697 1582 18a3698 call 5ab3cb9 1559->1582 1583 18a3698 call 5ab3cc8 1559->1583 1560 18a369e 1584 18a369f call 5ab4309 1560->1584 1585 18a369f call 5ab4318 1560->1585 1561 18a36a5 1586 18a36a6 call 5ab4959 1561->1586 1587 18a36a6 call 5ab4968 1561->1587 1562 18a36ac 1588 18a36ad call 5ab4f9f 1562->1588 1589 18a36ad call 5ab4fb0 1562->1589 1563 18a36b3-18a36ba 1592 18a36bb call 5ab5628 1563->1592 1593 18a36bb call 5ab5618 1563->1593 1565 18a36c1 1594 18a36c2 call 5aba648 1565->1594 1595 18a36c2 call 5aba658 1565->1595 1596 18a36c2 call 5aba6a0 1565->1596 1597 18a36c2 call 5aba690 1565->1597 1566 18a36c8-18a36f3 1568->1553 1569->1553 1570->1554 1571->1554 1572->1555 1573->1555 1574->1556 1575->1556 1576->1557 1577->1557 1578->1558 1579->1558 1580->1559 1581->1559 1582->1560 1583->1560 1584->1561 1585->1561 1586->1562 1587->1562 1588->1563 1589->1563 1590->1500 1591->1500 1592->1565 1593->1565 1594->1566 1595->1566 1596->1566 1597->1566 1600->1505 1601->1505 1611->1543 1612->1543 1618->1550 1619->1550 1620->1551 1621->1551 1622->1552 1623->1552
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 018A3506
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 6d022d28c38b5f2d0a66df943ea7fe196fbdc7416038c2b5ed9d0335b1559e0c
                                                • Instruction ID: f35768b6fd5d42c4cd864a5539e0712418d1d65ea79cc434cd3ce3fcbffe4786
                                                • Opcode Fuzzy Hash: 6d022d28c38b5f2d0a66df943ea7fe196fbdc7416038c2b5ed9d0335b1559e0c
                                                • Instruction Fuzzy Hash: 7E51DC30435746EFD7203B64F6AD16EBBB1FB5F313745AC00A11A90808AB39528AAF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05ABBA0F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 6df86d0c7bcc33d8065df71eca17dfa1599de2f046b756509069667693df001e
                                                • Instruction ID: ccf27e0c996030e0f5761051dd5c66474fbf7f0c672c1479911427ed2a1cce4d
                                                • Opcode Fuzzy Hash: 6df86d0c7bcc33d8065df71eca17dfa1599de2f046b756509069667693df001e
                                                • Instruction Fuzzy Hash: A421C2B5D00248AFDB10CFAAD984ADEBBF8FB48324F14841AE915A7310D374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05ABBA0F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.512709311.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5ab0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 74b9a28a47bdc567cfb5bf82ade956b60dbd01417ac6633b21fdf9047b0c60d6
                                                • Instruction ID: a2e3d44490480e9b2d7c98d842f3de2cfef498623f15f4082262efd6f6cbfba6
                                                • Opcode Fuzzy Hash: 74b9a28a47bdc567cfb5bf82ade956b60dbd01417ac6633b21fdf9047b0c60d6
                                                • Instruction Fuzzy Hash: E821E0B5D002489FDB10CFA9D984AEEBBF8FB48324F14841AE954B7310D374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510656223.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_184d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 84a94e2cb77ac113e6e84754dd5d54033f109f55882d1ece1e9a122d1cb4a06d
                                                • Instruction ID: 8841407c60d897e7a148aff772e5f3c1fa954da5f5a56d454e9c25d649317e26
                                                • Opcode Fuzzy Hash: 84a94e2cb77ac113e6e84754dd5d54033f109f55882d1ece1e9a122d1cb4a06d
                                                • Instruction Fuzzy Hash: 05214871504248DFCF06CF94D9C0B26BB65FB94328F248669ED058B206C736E916CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510656223.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_184d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 735538c041c7a834267379c4b7b675a456e839cabc4e9fe37c474ce0ed31016a
                                                • Instruction ID: dfeafe966ccfb432d73b92e803371da90fde5671f82a88aa1efe67990085afdb
                                                • Opcode Fuzzy Hash: 735538c041c7a834267379c4b7b675a456e839cabc4e9fe37c474ce0ed31016a
                                                • Instruction Fuzzy Hash: BD216771604248DFDB05CF94D9C0F66BF65FBA4328F20C6A9E9098B207C736E946C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510688045.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_185d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cba8bf4c016ed5d3b1331902b43d9662985924c376477e4e109cdbec49318e20
                                                • Instruction ID: 34827ebbfa284e9a83ce8ef1b61122677f8742223c2327bd7cb1aee99dbd8850
                                                • Opcode Fuzzy Hash: cba8bf4c016ed5d3b1331902b43d9662985924c376477e4e109cdbec49318e20
                                                • Instruction Fuzzy Hash: AC212575504204DFDB55CF64D5C4B26BB61FB84368F20CA6DDD098B246C33AD947CA61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510688045.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_185d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ee6590cd939d95599f25a81707420b80210f11596532cbe32f9b59cff5b5578
                                                • Instruction ID: af02eda0c2ccdcf742415eb037ae5e038b1cade5618b95b71caa51093009a990
                                                • Opcode Fuzzy Hash: 4ee6590cd939d95599f25a81707420b80210f11596532cbe32f9b59cff5b5578
                                                • Instruction Fuzzy Hash: 9F218E755093808FDB02CF24D990B15BF71EB46314F28C6EADC498B697C33A994ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510656223.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_184d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 248826f8912ba8bbe6fbbe1c0d6459dbdd0a1cd1aa6958882eedd21e5686885d
                                                • Instruction ID: 95190d1d29346589eec8d92e9105cc578ac1485f87d7e3d74647f71fef60acf1
                                                • Opcode Fuzzy Hash: 248826f8912ba8bbe6fbbe1c0d6459dbdd0a1cd1aa6958882eedd21e5686885d
                                                • Instruction Fuzzy Hash: 3621DF76404284CFCB06CF44D9C0B16BF72FB84320F28C6A9DC044B61AC33AD516CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510656223.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_184d000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                                • Instruction ID: f4ccc46e3d9e393164acafe063cd3b4e16a9e1de48c76a67b39c9d9841bce8ec
                                                • Opcode Fuzzy Hash: 2e6e55a4ab5eb979f697d8d29e7311c2f7f882bfa19d016223f37d0021767ff8
                                                • Instruction Fuzzy Hash: 7D110372504284CFCB12CF44D5C4B56BF71FB94324F24C6A9D8044B617C33AE556CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ae978cce1417f266ee69d432bdabbc6427895a8a5eed5716be64cac2f0747e3
                                                • Instruction ID: 4ae711b86d463e89f258997435c16d7cade16c6cdf7a7e8a3d26f7eff1b5b82a
                                                • Opcode Fuzzy Hash: 2ae978cce1417f266ee69d432bdabbc6427895a8a5eed5716be64cac2f0747e3
                                                • Instruction Fuzzy Hash: AF52CD74A002288FEB64DF69C884BEDBBB2BF89304F1081E9D509A7354DB759E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: de459c41bd9ca4a1caeef1b83296526489e6e74af449356af372efd9e337d008
                                                • Instruction ID: bc87f74bcc1ce4d8355622781f2da574cb6e58b3a61de72d98d97d9390970ec4
                                                • Opcode Fuzzy Hash: de459c41bd9ca4a1caeef1b83296526489e6e74af449356af372efd9e337d008
                                                • Instruction Fuzzy Hash: D1C1BF74E01218CFEB14DFA5C954BADBBB2FB89304F2080A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 45a248a49389a8e81fe5996548e0b14735a4abbb67bb544d27e1db84160e4654
                                                • Instruction ID: d064350ede5245e97bbdab7445e7fdef8d423ee17a937008f1984f593364ae2f
                                                • Opcode Fuzzy Hash: 45a248a49389a8e81fe5996548e0b14735a4abbb67bb544d27e1db84160e4654
                                                • Instruction Fuzzy Hash: D2C19074E00219CFDB18DFA5C954BADBBB2FB89304F2081A9D409AB354DB356E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2b2df9c76e220e340b506d2a13b1e73fcec2c8c0e066bfe0f5c7ac8914a1b34d
                                                • Instruction ID: 0a740e171d5e20e460b38e45b10fa292b1b7c5ebedc6d55790cd498c35cbe0ae
                                                • Opcode Fuzzy Hash: 2b2df9c76e220e340b506d2a13b1e73fcec2c8c0e066bfe0f5c7ac8914a1b34d
                                                • Instruction Fuzzy Hash: ACC19074E00219CFEB14DFA5C958BADBBB2FB89304F2081A9D809AB354DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99b9d13e1506becc4684817e29458a7cdac5bf137e9d7fe1292667eef4608e45
                                                • Instruction ID: 0af611a1f06f0149117efe2c99ff8976b2010f94288129306a185132d1efd729
                                                • Opcode Fuzzy Hash: 99b9d13e1506becc4684817e29458a7cdac5bf137e9d7fe1292667eef4608e45
                                                • Instruction Fuzzy Hash: 51C1A074E01218CFDB14DFA5C954BADBBB2FB89304F2081A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a233312db1c6db1ba4f4f0b09fb34c7a7d71f9cadbfd7da99e5e093739a47cc1
                                                • Instruction ID: 930bef8694ef21c2435f789f36f9b46441d42b0fa947c6b4d4049881dd41425d
                                                • Opcode Fuzzy Hash: a233312db1c6db1ba4f4f0b09fb34c7a7d71f9cadbfd7da99e5e093739a47cc1
                                                • Instruction Fuzzy Hash: FBC1A074E00219CFDB14DFA5C958B9DBBB2FB89304F2081A9D809AB354DB355E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a2758ae2b32c4dc44af2764bff7481df38fdbfb8642df9653c590db5327873a4
                                                • Instruction ID: 6009e9abd109c6f7133a0ebc11147f58a551a1b25921db6ad6e7686f275cff27
                                                • Opcode Fuzzy Hash: a2758ae2b32c4dc44af2764bff7481df38fdbfb8642df9653c590db5327873a4
                                                • Instruction Fuzzy Hash: 29C1A074E00219CFDB14DFA5C954BADBBB2FB89304F2080A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7913cf77a16027ce861ee29a1ac0c868da739da4d9650eaed2ab413c0aa6b8ea
                                                • Instruction ID: 87f73715b4fe9bf81866e59aa6d7be4dcc4cc29cd18c08feb532706145270ff6
                                                • Opcode Fuzzy Hash: 7913cf77a16027ce861ee29a1ac0c868da739da4d9650eaed2ab413c0aa6b8ea
                                                • Instruction Fuzzy Hash: 5DC1A074E00219CFDB18DFA5C954BADBBB2FB89304F2080A9D409AB355DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 858a9a160e1c0ec90a08f8886124192d21bce43f1a6e2323c85a484498a403a2
                                                • Instruction ID: 72d9ebd5262a94951aba2f4d7e6ba2d5cc5fc5697a736f96a3c469467d5ed27e
                                                • Opcode Fuzzy Hash: 858a9a160e1c0ec90a08f8886124192d21bce43f1a6e2323c85a484498a403a2
                                                • Instruction Fuzzy Hash: 75C1A074E04219CFDB14DFA5C954BADBBB2FB89304F2080A9D409AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5fd465ae385796a89e2ad704356d7476b16842d1ded186b63b58193da6bcbefc
                                                • Instruction ID: 7e579d44aeb7ffda7273e739cbc697dbe3ec91960518d30a33c7e458ff3a41b2
                                                • Opcode Fuzzy Hash: 5fd465ae385796a89e2ad704356d7476b16842d1ded186b63b58193da6bcbefc
                                                • Instruction Fuzzy Hash: 0FC19074E04219CFDB14DFA5C954BADBBB2FB89304F2080A9D809AB394DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ae9d9076d8e799a6e5a25a1066ca85f5b22f4aade90c6d49ac4d8c6e958b23d
                                                • Instruction ID: c3e401b5afc826fdf387b3fcc754fccf9082a00aca5889ee494b7564d19f568d
                                                • Opcode Fuzzy Hash: 6ae9d9076d8e799a6e5a25a1066ca85f5b22f4aade90c6d49ac4d8c6e958b23d
                                                • Instruction Fuzzy Hash: BAC1AF74E042188FDB18DFA5C954BADBBB2FF89304F2081A9D409AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 33b24202006bb5bdc8554ea62f35ce90235d20c35476b903ccb5495177c4c28e
                                                • Instruction ID: 954595be6d55bf1f0a45182593c1c44e8bb7603d4aa7a0dec1fb47c5b82fea79
                                                • Opcode Fuzzy Hash: 33b24202006bb5bdc8554ea62f35ce90235d20c35476b903ccb5495177c4c28e
                                                • Instruction Fuzzy Hash: 78C19074E00219CFDB14DFA5D954BADBBB2FB89304F2080A9D809AB354DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6c9d26d0848ab45f18291d60dd9236e650c425b7e741136564ad22b05e99b3c8
                                                • Instruction ID: 31485d1f8603d1a77ffd60f4b8e7c2853cbf7e1e434b0e1b9e8d78191bb3284c
                                                • Opcode Fuzzy Hash: 6c9d26d0848ab45f18291d60dd9236e650c425b7e741136564ad22b05e99b3c8
                                                • Instruction Fuzzy Hash: 95C1BF74E042188FDB14DFA5C954BADBBB2FF89304F2080A9D809AB355DB395E85CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ee6fe8002737dcfb6a9786fc87ae404b2c0d1627be690abdf3ac850e3924636
                                                • Instruction ID: 480802370005eab5e6f0d647ab565b2bb88c3ff144305058c87a9e71a3703ae4
                                                • Opcode Fuzzy Hash: 8ee6fe8002737dcfb6a9786fc87ae404b2c0d1627be690abdf3ac850e3924636
                                                • Instruction Fuzzy Hash: 12B1D578E00218CFDB54DFA9D984A9DBBB2FF89314F1181A9D819AB365DB34AD41CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 987687e2985125003931a026c1d1432245f91d1d2802f8599310b0747ce822eb
                                                • Instruction ID: a199f110ca3118014b6588e64a10b01897376d7c7db457ee6823b168da1229ae
                                                • Opcode Fuzzy Hash: 987687e2985125003931a026c1d1432245f91d1d2802f8599310b0747ce822eb
                                                • Instruction Fuzzy Hash: 6EA1BD74A01228CFEB64DF24C998BD9BBB2BB4A305F5085E9D90DA7350DB719E80CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.513247312.0000000005FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FC0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5fc0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7acd780fa3b4f6f365e96a6921082133810cd1f0d85b34232912305dd9c7f7ed
                                                • Instruction ID: dc16582e9eccc087b30a246c7570ec169a3574bc5ce32617a4e0dc93112e3546
                                                • Opcode Fuzzy Hash: 7acd780fa3b4f6f365e96a6921082133810cd1f0d85b34232912305dd9c7f7ed
                                                • Instruction Fuzzy Hash: B651A4B5E006088FDB08CFAAD584A9DBBF2FF89300F158169D819AB365DB349945CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.510771923.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_18a0000_HvAnUIF17C.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 63edeebaccafd423b283ff5be4439b29e2bfa173f684db2b8c26eb1e6ffa59bc
                                                • Instruction ID: 8a1e7f41611c1be1383eca75b5424ca76abab2714a87152d9d896033008f75c7
                                                • Opcode Fuzzy Hash: 63edeebaccafd423b283ff5be4439b29e2bfa173f684db2b8c26eb1e6ffa59bc
                                                • Instruction Fuzzy Hash: 5B51BE74A00228CFDB64DF24D998B9AB7B2BB4A305F5085E9D80AA7354DB719E81CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%