Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P0A2249.exe

Overview

General Information

Sample Name:P0A2249.exe
Analysis ID:708246
MD5:43f9694be950da3cbc89ceb296b2eb3b
SHA1:2138532f5a09386b06a338acab2b79b0167b7f62
SHA256:aa42f20183026e8912e487dc655d4459e8e37e3743cdc7753dc60fa712d8117f
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • P0A2249.exe (PID: 5572 cmdline: "C:\Users\user\Desktop\P0A2249.exe" MD5: 43F9694BE950DA3CBC89CEB296B2EB3B)
    • P0A2249.exe (PID: 6092 cmdline: C:\Users\user\Desktop\P0A2249.exe MD5: 43F9694BE950DA3CBC89CEB296B2EB3B)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "5478319803:AAHq9LkDUFBRvjOub4YfRlPURZxM59_BVnc", "Telegram ID": "5516439768"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x50e04:$x1: $%SMTPDV$
        • 0x70424:$x1: $%SMTPDV$
        • 0x4fac6:$x2: $#TheHashHere%&
        • 0x6f0e6:$x2: $#TheHashHere%&
        • 0x50dac:$x3: %FTPDV$
        • 0x703cc:$x3: %FTPDV$
        • 0x4faa8:$x4: $%TelegramDv$
        • 0x6f0c8:$x4: $%TelegramDv$
        • 0x4d437:$x5: KeyLoggerEventArgs
        • 0x4d7cd:$x5: KeyLoggerEventArgs
        • 0x6ca57:$x5: KeyLoggerEventArgs
        • 0x6cded:$x5: KeyLoggerEventArgs
        • 0x50e30:$m1: | Snake Keylogger
        • 0x50ed6:$m1: | Snake Keylogger
        • 0x5102a:$m1: | Snake Keylogger
        • 0x51150:$m1: | Snake Keylogger
        • 0x512aa:$m1: | Snake Keylogger
        • 0x70450:$m1: | Snake Keylogger
        • 0x704f6:$m1: | Snake Keylogger
        • 0x7064a:$m1: | Snake Keylogger
        • 0x70770:$m1: | Snake Keylogger
        00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x4c241:$a1: get_encryptedPassword
        • 0x6b861:$a1: get_encryptedPassword
        • 0x4c52d:$a2: get_encryptedUsername
        • 0x6bb4d:$a2: get_encryptedUsername
        • 0x4c04d:$a3: get_timePasswordChanged
        • 0x6b66d:$a3: get_timePasswordChanged
        • 0x4c148:$a4: get_passwordField
        • 0x6b768:$a4: get_passwordField
        • 0x4c257:$a5: set_encryptedPassword
        • 0x6b877:$a5: set_encryptedPassword
        • 0x4d86a:$a7: get_logins
        • 0x6ce8a:$a7: get_logins
        • 0x4d7cd:$a10: KeyLoggerEventArgs
        • 0x6cded:$a10: KeyLoggerEventArgs
        • 0x4d437:$a11: KeyLoggerEventArgsEventHandler
        • 0x6ca57:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 22 entries
        SourceRuleDescriptionAuthorStrings
        0.2.P0A2249.exe.3883640.10.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1b0c4:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x3a6e4:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1a2ad:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x398cd:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1a6f4:$a4: \Orbitum\User Data\Default\Login Data
        • 0x39d14:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1b875:$a5: \Kometa\User Data\Default\Login Data
        • 0x3ae95:$a5: \Kometa\User Data\Default\Login Data
        0.2.P0A2249.exe.3883640.10.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.P0A2249.exe.3883640.10.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            0.2.P0A2249.exe.3883640.10.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.2.P0A2249.exe.3883640.10.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 38 entries
                No Sigma rule has matched
                Timestamp:192.168.2.3193.122.130.049702802842536 09/23/22-08:11:16.993448
                SID:2842536
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: P0A2249.exeReversingLabs: Detection: 17%
                Source: 1.0.P0A2249.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5478319803:AAHq9LkDUFBRvjOub4YfRlPURZxM59_BVnc", "Telegram ID": "5516439768"}
                Source: P0A2249.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: P0A2249.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D63D1h1_2_015D6111
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D7507h1_2_015D71DA
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D8687h1_2_015D83C9
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015DF539h1_2_015DF280
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D5F70h1_2_015D5587
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015DEC8Ah1_2_015DE758
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015DF991h1_2_015DF6D8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D6B10h1_2_015D66F8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D7967h1_2_015D76A8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D7DC7h1_2_015D7B08
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015DFDE9h1_2_015DFB30
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D8227h1_2_015D7F68
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015DF0E1h1_2_015DEE28
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_015D50DB
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_015D52BC
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D6B10h1_2_015D66E8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 015D6B10h1_2_015D6A3E
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_015D4AA8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0FAE1h1_2_05A0F838
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0F231h1_2_05A0EF88
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0F689h1_2_05A0F3E0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0EDD9h1_2_05A0EB30
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0E529h1_2_05A0E280
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0E981h1_2_05A0E6D8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A07441h1_2_05A07198
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A07899h1_2_05A075F0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A04479h1_2_05A041D0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A03BC9h1_2_05A03920
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A04021h1_2_05A03D78
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A06FE9h1_2_05A06D40
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A06739h1_2_05A06490
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A06B91h1_2_05A068E8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A03771h1_2_05A034C8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_05A0C020
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A062E1h1_2_05A06038
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_05A0C00F
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A03319h1_2_05A03070
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A05A31h1_2_05A05788
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A05E89h1_2_05A05BE0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A055D9h1_2_05A05330
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_05A0C336
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A089F9h1_2_05A08750
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A08149h1_2_05A07EA0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A04D29h1_2_05A04A80
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A085A1h1_2_05A082F8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A05181h1_2_05A04ED8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A048D1h1_2_05A04628
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A0E0A9h1_2_05A0DE00
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 4x nop then jmp 05A07CF1h1_2_05A07A48

                Networking

                barindex
                Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.3:49702 -> 193.122.130.0:80
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\P0A2249.exeDNS query: name: checkip.dyndns.org
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: P0A2249.exe, 00000001.00000002.509834203.00000000030D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: P0A2249.exe, 00000001.00000002.509834203.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.509786023.00000000030C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: P0A2249.exe, 00000001.00000002.509215659.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: P0A2249.exe, 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: P0A2249.exe, 00000001.00000002.509786023.00000000030C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4Rk0%
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: P0A2249.exe, 00000000.00000002.263992516.0000000002471000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.509215659.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: P0A2249.exe, 00000000.00000003.248064801.0000000005927000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248032820.0000000005926000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248091025.0000000005927000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248048236.0000000005926000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html.
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: P0A2249.exe, 00000000.00000003.262445246.00000000058F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
                Source: P0A2249.exe, 00000000.00000003.262445246.00000000058F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                Source: P0A2249.exe, 00000000.00000003.242838731.00000000058F3000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: P0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245133873.00000000058FC000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: P0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnP&br
                Source: P0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnT%~s
                Source: P0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnZ&xr
                Source: P0A2249.exe, 00000000.00000003.245133873.00000000058FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnb%0s
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: P0A2249.exe, 00000000.00000003.251458280.0000000005929000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.251535004.000000000592D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: P0A2249.exe, 00000000.00000003.247049588.0000000005926000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: P0A2249.exe, 00000000.00000003.247064033.0000000005926000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comu
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: P0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comO
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: P0A2249.exe, 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                System Summary

                barindex
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: P0A2249.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 0_2_0099CD380_2_0099CD38
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D61111_2_015D6111
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D71DA1_2_015D71DA
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D83C91_2_015D83C9
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DF2801_2_015DF280
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D55871_2_015D5587
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DA45A1_2_015DA45A
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DE7581_2_015DE758
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DF6D81_2_015DF6D8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D76A81_2_015D76A8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D7B081_2_015D7B08
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DFB301_2_015DFB30
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D6B881_2_015D6B88
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D7F681_2_015D7F68
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DEE281_2_015DEE28
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D6B781_2_015D6B78
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D4A981_2_015D4A98
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D4AA81_2_015D4AA8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D2C291_2_015D2C29
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DDFD01_2_015DDFD0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015DDFE01_2_015DDFE0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0F8381_2_05A0F838
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0EF881_2_05A0EF88
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0F3E01_2_05A0F3E0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0EB301_2_05A0EB30
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0E2801_2_05A0E280
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0E6D81_2_05A0E6D8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A071881_2_05A07188
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A071981_2_05A07198
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A075E01_2_05A075E0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A075F01_2_05A075F0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0DDF01_2_05A0DDF0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A041C01_2_05A041C0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A041D01_2_05A041D0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A039201_2_05A03920
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A06D361_2_05A06D36
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A039101_2_05A03910
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A03D681_2_05A03D68
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A03D781_2_05A03D78
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A06D401_2_05A06D40
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A034B81_2_05A034B8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A064821_2_05A06482
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A064901_2_05A06490
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0D0981_2_05A0D098
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A068E81_2_05A068E8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A034C81_2_05A034C8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A068D81_2_05A068D8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0C0201_2_05A0C020
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0F8281_2_05A0F828
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0602E1_2_05A0602E
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A060381_2_05A06038
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0C00F1_2_05A0C00F
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0001B1_2_05A0001B
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A030601_2_05A03060
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A030701_2_05A03070
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A000401_2_05A00040
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A08BA81_2_05A08BA8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A057881_2_05A05788
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0C3981_2_05A0C398
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A05BE01_2_05A05BE0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A05BD01_2_05A05BD0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0F3D01_2_05A0F3D0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0EB201_2_05A0EB20
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A053211_2_05A05321
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A053301_2_05A05330
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0B7701_2_05A0B770
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A057781_2_05A05778
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0EF791_2_05A0EF79
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A087411_2_05A08741
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A087501_2_05A08750
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A07EA01_2_05A07EA0
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A04A801_2_05A04A80
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A07E901_2_05A07E90
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A082E81_2_05A082E8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A082F81_2_05A082F8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A04EC81_2_05A04EC8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0E6C81_2_05A0E6C8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0B6C91_2_05A0B6C9
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A04ED81_2_05A04ED8
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A046281_2_05A04628
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A07A3C1_2_05A07A3C
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0DE001_2_05A0DE00
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A046191_2_05A04619
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A04A701_2_05A04A70
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A0E2711_2_05A0E271
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_05A07A481_2_05A07A48
                Source: P0A2249.exe, 00000000.00000002.264452627.0000000002538000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.263992516.0000000002471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.264557057.0000000002550000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.276640107.00000000072A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000000.238680700.0000000000150000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQnKo.exeD vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.276572114.0000000007230000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTargetParameterCount.dll> vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs P0A2249.exe
                Source: P0A2249.exe, 00000000.00000002.276659699.0000000007480000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs P0A2249.exe
                Source: P0A2249.exe, 00000001.00000000.260646220.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs P0A2249.exe
                Source: P0A2249.exe, 00000001.00000002.506587497.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs P0A2249.exe
                Source: P0A2249.exeBinary or memory string: OriginalFilenameQnKo.exeD vs P0A2249.exe
                Source: P0A2249.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: P0A2249.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: P0A2249.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: P0A2249.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: P0A2249.exeReversingLabs: Detection: 17%
                Source: C:\Users\user\Desktop\P0A2249.exeFile read: C:\Users\user\Desktop\P0A2249.exe:Zone.IdentifierJump to behavior
                Source: P0A2249.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\P0A2249.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\P0A2249.exe "C:\Users\user\Desktop\P0A2249.exe"
                Source: C:\Users\user\Desktop\P0A2249.exeProcess created: C:\Users\user\Desktop\P0A2249.exe C:\Users\user\Desktop\P0A2249.exe
                Source: C:\Users\user\Desktop\P0A2249.exeProcess created: C:\Users\user\Desktop\P0A2249.exe C:\Users\user\Desktop\P0A2249.exeJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\P0A2249.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/1
                Source: P0A2249.exe, 00000001.00000002.509972900.00000000030F8000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.510397839.00000000040AB000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.509947279.00000000030EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: P0A2249.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\P0A2249.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                Source: 1.0.P0A2249.exe.400000.0.unpack, ?ufffdufffd??/ufffd??ufffd?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 1.0.P0A2249.exe.400000.0.unpack, O?u0385??/ufffd?ufffdtu061d.csCryptographic APIs: 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\P0A2249.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: P0A2249.exeStatic file information: File size 1191424 > 1048576
                Source: P0A2249.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: P0A2249.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: P0A2249.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: P0A2249.exe, GUI/DangNhap.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.P0A2249.exe.70000.0.unpack, GUI/DangNhap.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D8F09 push FFFFFF8Bh; iretd 1_2_015D8F0D
                Source: P0A2249.exeStatic PE information: 0xA2A7912B [Thu Jun 22 09:11:07 2056 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 6.919011980791601
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239844s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239592s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239467s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239248s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -239031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238592s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238151s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -238031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237907s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237616s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -237046s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236809s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236357s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -236079s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235733s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235608s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -235031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234891s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234623s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234374s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exe TID: 5564Thread sleep time: -234002s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239844Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239592Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239467Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239359Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239248Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239140Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238922Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238812Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238592Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238484Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238375Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238151Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237907Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237750Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237616Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237484Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237375Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237156Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237046Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236937Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236809Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236593Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236468Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236357Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236203Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236079Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235953Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235843Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235733Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235608Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235500Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235390Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235140Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234891Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234750Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234623Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234500Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234374Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234249Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234125Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234002Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeWindow / User API: threadDelayed 8744Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239844Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239592Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239467Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239359Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239248Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239140Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 239031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238922Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238812Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238592Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238484Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238375Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238151Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 238031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237907Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237750Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237616Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237484Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237375Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237156Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 237046Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236937Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236809Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236703Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236593Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236468Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236357Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236203Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 236079Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235953Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235843Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235733Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235608Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235500Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235390Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235265Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235140Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 235031Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234891Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234750Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234623Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234500Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234374Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234249Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234125Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeThread delayed: delay time: 234002Jump to behavior
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMUDSOFTWARE\VMware, Inc.\VMware ToolsNSYSTEM\ControlSet001\Services\Disk\Enum
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II2VM Additions S3 Trio32/64
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware VideoBiosVersion
                Source: P0A2249.exe, 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: P0A2249.exe, 00000001.00000002.508220253.0000000001426000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]
                Source: C:\Users\user\Desktop\P0A2249.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeCode function: 1_2_015D5587 LdrInitializeThunk,1_2_015D5587
                Source: C:\Users\user\Desktop\P0A2249.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 1.0.P0A2249.exe.400000.0.unpack, O?u0385??/ufffd?ufffdtu061d.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                Source: 1.0.P0A2249.exe.400000.0.unpack, u002d?ufffd?t/ufffd?ufffd??.csReference to suspicious API methods: ('???c?', 'LoadLibrary@kernel32.dll'), ('??Bz?', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\P0A2249.exeMemory written: C:\Users\user\Desktop\P0A2249.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeProcess created: C:\Users\user\Desktop\P0A2249.exe C:\Users\user\Desktop\P0A2249.exeJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Users\user\Desktop\P0A2249.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Users\user\Desktop\P0A2249.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTR
                Source: C:\Users\user\Desktop\P0A2249.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\P0A2249.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.P0A2249.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3883640.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.3515a00.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.P0A2249.exe.34b5928.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 5572, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: P0A2249.exe PID: 6092, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                Software Packing
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                P0A2249.exe18%ReversingLabsByteCode-MSIL.Packed.Generic
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                1.0.P0A2249.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                0.2.P0A2249.exe.34b5928.9.unpack100%AviraHEUR/AGEN.1244307Download File
                SourceDetectionScannerLabelLink
                checkip.dyndns.com0%VirustotalBrowse
                checkip.dyndns.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.fontbureau.coma0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://checkip.dyndns.org4Rk0%0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://www.fontbureau.comB.TTF0%URL Reputationsafe
                http://www.monotype.0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.founder.com.cn/cnP&br0%Avira URL Cloudsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.founder.com.cn/cnT%~s0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnZ&xr0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnb%0s0%Avira URL Cloudsafe
                http://www.tiro.comO0%Avira URL Cloudsafe
                http://www.sakkal.comu0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                193.122.130.0
                truetrueunknown
                checkip.dyndns.org
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/true
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org4Rk0%P0A2249.exe, 00000001.00000002.509786023.00000000030C4000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/botP0A2249.exe, 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers?P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/frere-jones.html.P0A2249.exe, 00000000.00000003.248064801.0000000005927000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248032820.0000000005926000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248091025.0000000005927000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.248048236.0000000005926000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.tiro.comP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.orgP0A2249.exe, 00000001.00000002.509834203.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.509786023.00000000030C4000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnP&brP0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designersP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comaP0A2249.exe, 00000000.00000003.262445246.00000000058F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comuP0A2249.exe, 00000000.00000003.247064033.0000000005926000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cTheP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnP0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245133873.00000000058FC000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comB.TTFP0A2249.exe, 00000000.00000003.262445246.00000000058F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.monotype.P0A2249.exe, 00000000.00000003.251458280.0000000005929000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.251535004.000000000592D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.comOP0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://checkip.dyndns.org/qP0A2249.exe, 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comP0A2249.exe, 00000000.00000003.242838731.00000000058F3000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://checkip.dyndns.comP0A2249.exe, 00000001.00000002.509834203.00000000030D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnT%~sP0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.urwpp.deDPleaseP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnP0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnZ&xrP0A2249.exe, 00000000.00000003.245640025.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000003.245514997.00000000058FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP0A2249.exe, 00000000.00000002.263992516.0000000002471000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000001.00000002.509215659.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sakkal.comP0A2249.exe, 00000000.00000003.247049588.0000000005926000.00000004.00000800.00020000.00000000.sdmp, P0A2249.exe, 00000000.00000002.274934321.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnb%0sP0A2249.exe, 00000000.00000003.245133873.00000000058FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          193.122.130.0
                                          checkip.dyndns.comUnited States
                                          31898ORACLE-BMC-31898UStrue
                                          Joe Sandbox Version:36.0.0 Rainbow Opal
                                          Analysis ID:708246
                                          Start date and time:2022-09-23 08:10:13 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 57s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:P0A2249.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@3/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 42
                                          • Number of non-executed functions: 28
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          08:11:04API Interceptor84x Sleep call for process: P0A2249.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          193.122.130.022588SANZI.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          INV012000.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          rWLEI3BVkx.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          RFQ pdf.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          n9nfBAqVb5.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          draft BL.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          V1tpzWRE2V.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          statement of account.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          payment term.PDF.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SOA.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Prueba de pago.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          oHPqKCAY7R.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          TT details.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          DHL Airwaybill.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Purchase_Order.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          PO-0017pdf.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          uchefile.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SOA.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Vuitbiubu.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          NEW_PO#671928273.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          checkip.dyndns.com22588SANZI.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Arrival_Percel No00929887355..exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          IMG-1300466.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Specifications_Details_RFQ.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          INV012000.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Wtughrrlt.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          rWLEI3BVkx.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          qwOpaDGcHJ.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          4b9SFahCuA.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          specification.docGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          Order#6875480.xlsxGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          49HDD3uFb8.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          RFQ pdf.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          BBVA-Confirming Liquidaci#Ufffdn por Factorizaci#Ufffdn de Cr#Ufffdditos.vbsGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Specifications_Details_30200_RFQ.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          21092022_receipt.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          New Order.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          KREDI.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          4nz1Kr0NLW.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          JD22 SEPT0 7 Shipping documents.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          ORACLE-BMC-31898UShttps://w50axrlbxmvawqtsharefile.evalandgo.com/form/449781/s/?id=JTk5ciU5MXAlOTklQUI=&a=JTk4bSU5QW8lOUUlQUE=Get hashmaliciousBrowse
                                          • 134.70.48.1
                                          22588SANZI.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Arrival_Percel No00929887355..exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          INV012000.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          rWLEI3BVkx.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          qwOpaDGcHJ.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          4b9SFahCuA.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          specification.docGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          Order#6875480.xlsxGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          49HDD3uFb8.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          RFQ pdf.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Specifications_Details_30200_RFQ.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          Z9kN4mToxe.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          n9nfBAqVb5.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          draft BL.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          scan21092022_product_spec_AU9389990001.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          e7waae4AKB.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          l1stfq0J4k.rtfGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          SecuriteInfo.com.Win32.Malware-gen.16408.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          Specification Accommodation Work Boats.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\P0A2249.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1394
                                          Entropy (8bit):5.340883346054895
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84F0:MIHK5HKXE1qHbHKnYHKhQnoPtHoxHhAR
                                          MD5:B51A52A837298BCF7A6EB58551AEF99C
                                          SHA1:61EEFCC20AC255B8651769E5C48E27B2A983FC4A
                                          SHA-256:1D393FBB3CE754EA699462C2778587A7F2451EB23BE2BD5084C95A46B20BE8AF
                                          SHA-512:138544399787651C847837719606197E539857206CCB271E0F4A86E2017FBADABADF5A235B6F6F1DA8ADE7EF29DBA3115CD1996AD01F92CA30C57D0BF217C11C
                                          Malicious:true
                                          Reputation:moderate, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e08
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):6.616410424839483
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:P0A2249.exe
                                          File size:1191424
                                          MD5:43f9694be950da3cbc89ceb296b2eb3b
                                          SHA1:2138532f5a09386b06a338acab2b79b0167b7f62
                                          SHA256:aa42f20183026e8912e487dc655d4459e8e37e3743cdc7753dc60fa712d8117f
                                          SHA512:f6dedfc5b460f7eddbee51f4d0b98490a4b7f0791a573f803823d5444c52519bed0dcbaa73b213ff826b3a5a00c0822adde87301268fa350567285f22d0240ac
                                          SSDEEP:12288:0hLuyAHYT68OXKtHRtD4/coF8IxbVp2w2L6TVHLT0R2pmMCTi:0hLuyyW65X2k/F8nw2cHLTU6C
                                          TLSH:FD457E92B1908D9BE86B16F1AC66D53012E7AD5C94A4C10D5ADABF1F71F3342209FF0E
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...+.................0.............J.... ........@.. ....................................@................................
                                          Icon Hash:aeacae8eb6a2be00
                                          Entrypoint:0x4dbf4a
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0xA2A7912B [Thu Jun 22 09:11:07 2056 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add al, 00h
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add eax, dword ptr [eax]
                                          add eax, dword ptr [eax]
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xdbef80x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc0000x488c8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xdbedc0x1c.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xd9f500xda000False0.7176838446100917data6.919011980791601IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xdc0000x488c80x48a00False0.062308385327022375data4.758656767526677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x1260000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xdc2980x668data
                                          RT_ICON0xdc9000x2e8data
                                          RT_ICON0xdcbe80x128GLS_BINARY_LSB_FIRST
                                          RT_ICON0xdcd100xea8data
                                          RT_ICON0xddbb80x8a8dBase III DBT, version number 0, next free block index 40
                                          RT_ICON0xde4600x568GLS_BINARY_LSB_FIRST
                                          RT_ICON0xde9c80x42028dBase III DBT, version number 0, next free block index 40
                                          RT_ICON0x1209f00x25a8data
                                          RT_ICON0x122f980x10a8data
                                          RT_ICON0x1240400x468GLS_BINARY_LSB_FIRST
                                          RT_GROUP_ICON0x1244a80x92data
                                          RT_VERSION0x12453c0x38cPGP symmetric key encrypted data - Plaintext or unencrypted data
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          192.168.2.3193.122.130.049702802842536 09/23/22-08:11:16.993448TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4970280192.168.2.3193.122.130.0
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 23, 2022 08:11:16.876717091 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:11:16.984992981 CEST8049702193.122.130.0192.168.2.3
                                          Sep 23, 2022 08:11:16.987874985 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:11:16.993448019 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:11:17.101823092 CEST8049702193.122.130.0192.168.2.3
                                          Sep 23, 2022 08:11:17.103646040 CEST8049702193.122.130.0192.168.2.3
                                          Sep 23, 2022 08:11:17.152368069 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:12:22.103549957 CEST8049702193.122.130.0192.168.2.3
                                          Sep 23, 2022 08:12:22.103838921 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:12:57.146246910 CEST4970280192.168.2.3193.122.130.0
                                          Sep 23, 2022 08:12:57.254538059 CEST8049702193.122.130.0192.168.2.3
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 23, 2022 08:11:15.790663004 CEST4997753192.168.2.38.8.8.8
                                          Sep 23, 2022 08:11:15.808007002 CEST53499778.8.8.8192.168.2.3
                                          Sep 23, 2022 08:11:15.828238010 CEST5784053192.168.2.38.8.8.8
                                          Sep 23, 2022 08:11:16.841366053 CEST5784053192.168.2.38.8.8.8
                                          Sep 23, 2022 08:11:16.860634089 CEST53578408.8.8.8192.168.2.3
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Sep 23, 2022 08:11:15.790663004 CEST192.168.2.38.8.8.80xf46eStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.828238010 CEST192.168.2.38.8.8.80x98b9Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.841366053 CEST192.168.2.38.8.8.80x98b9Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:15.808007002 CEST8.8.8.8192.168.2.30xf46eNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                          Sep 23, 2022 08:11:16.860634089 CEST8.8.8.8192.168.2.30x98b9No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                          • checkip.dyndns.org
                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.349702193.122.130.080C:\Users\user\Desktop\P0A2249.exe
                                          TimestampkBytes transferredDirectionData
                                          Sep 23, 2022 08:11:16.993448019 CEST102OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Sep 23, 2022 08:11:17.103646040 CEST102INHTTP/1.1 200 OK
                                          Date: Fri, 23 Sep 2022 06:11:17 GMT
                                          Content-Type: text/html
                                          Content-Length: 103
                                          Connection: keep-alive
                                          Cache-Control: no-cache
                                          Pragma: no-cache
                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 34 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.43</body></html>


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:08:11:03
                                          Start date:23/09/2022
                                          Path:C:\Users\user\Desktop\P0A2249.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\P0A2249.exe"
                                          Imagebase:0x70000
                                          File size:1191424 bytes
                                          MD5 hash:43F9694BE950DA3CBC89CEB296B2EB3B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.267679195.000000000384B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.264198138.00000000024C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.265747551.00000000034B5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low

                                          Target ID:1
                                          Start time:08:11:12
                                          Start date:23/09/2022
                                          Path:C:\Users\user\Desktop\P0A2249.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\P0A2249.exe
                                          Imagebase:0xbb0000
                                          File size:1191424 bytes
                                          MD5 hash:43F9694BE950DA3CBC89CEB296B2EB3B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000000.260243480.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:15.5%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:43
                                            Total number of Limit Nodes:1
                                            execution_graph 11079 9940d0 11080 9940e2 11079->11080 11081 9940ee 11080->11081 11083 9941e0 11080->11083 11084 994205 11083->11084 11088 9942d0 11084->11088 11092 9942e0 11084->11092 11090 994307 11088->11090 11089 9943e4 11090->11089 11096 9938a8 11090->11096 11093 994307 11092->11093 11094 9943e4 11093->11094 11095 9938a8 CreateActCtxA 11093->11095 11094->11094 11095->11094 11097 995370 CreateActCtxA 11096->11097 11099 995433 11097->11099 11100 9971f0 11101 997204 11100->11101 11102 99720d 11101->11102 11104 99742a 11101->11104 11109 997688 11104->11109 11113 997500 11104->11113 11117 997510 11104->11117 11110 99768e 11109->11110 11121 997bd0 11110->11121 11111 997433 11111->11102 11114 997554 11113->11114 11115 99764b 11114->11115 11129 997907 11114->11129 11118 997554 11117->11118 11119 99764b 11118->11119 11120 997907 RtlEncodePointer 11118->11120 11120->11119 11122 997bde 11121->11122 11125 997c14 11122->11125 11123 997bee 11123->11111 11126 997c51 11125->11126 11127 997c77 RtlEncodePointer 11126->11127 11128 997ca0 11126->11128 11127->11128 11128->11123 11130 997926 11129->11130 11133 997968 11130->11133 11131 997936 11131->11115 11134 9979a2 11133->11134 11135 9979cc RtlEncodePointer 11134->11135 11136 9979f5 11134->11136 11135->11136 11136->11131
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263659028.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_990000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 48%l$48%l$d
                                            • API String ID: 0-2674703226
                                            • Opcode ID: d0ba71b4179b0b3fa9b487d353b3abec848f99bc5b7ae0f37e39f7edd4281f7a
                                            • Instruction ID: e26b536dd8effbb2f8bb072d091e24f1e0539baa98bcfa5183ca3094ef8b35b6
                                            • Opcode Fuzzy Hash: d0ba71b4179b0b3fa9b487d353b3abec848f99bc5b7ae0f37e39f7edd4281f7a
                                            • Instruction Fuzzy Hash: 52F27D74B052198FDF18DF68C894AADB7B2FB89304F1184A9D90A9B395DB34DC42CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1521 9938a8-995431 CreateActCtxA 1524 99543a-995494 1521->1524 1525 995433-995439 1521->1525 1532 9954a3-9954a7 1524->1532 1533 995496-995499 1524->1533 1525->1524 1534 9954a9-9954b5 1532->1534 1535 9954b8 1532->1535 1533->1532 1534->1535 1537 9954b9 1535->1537 1537->1537
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00995421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263659028.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_990000_P0A2249.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 955880416337af4d2e14018f1e37a02352d0da76ebbfdc12417d4ec3dba19729
                                            • Instruction ID: dab9888ee7b0c7c85fdbb108f8331d5c38f92ed20ecc8cdecc6da6851dae8a37
                                            • Opcode Fuzzy Hash: 955880416337af4d2e14018f1e37a02352d0da76ebbfdc12417d4ec3dba19729
                                            • Instruction Fuzzy Hash: 2541D271D04619CBDB24DFA9C8847DEBBF5BF49308F118069D408AB251D7B56986CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1538 995364-995431 CreateActCtxA 1540 99543a-995494 1538->1540 1541 995433-995439 1538->1541 1548 9954a3-9954a7 1540->1548 1549 995496-995499 1540->1549 1541->1540 1550 9954a9-9954b5 1548->1550 1551 9954b8 1548->1551 1549->1548 1550->1551 1553 9954b9 1551->1553 1553->1553
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00995421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263659028.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_990000_P0A2249.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: e830b880bbc6445c727c6e89898968ee1f53f09938e5143934d2e5c4c7861435
                                            • Instruction ID: f4769f48a5653e06085b49a6aa8c891d2edd2f09d4781188b4f2b524b4049f69
                                            • Opcode Fuzzy Hash: e830b880bbc6445c727c6e89898968ee1f53f09938e5143934d2e5c4c7861435
                                            • Instruction Fuzzy Hash: 08410471D04619CFDB24CFA9C884BDEBBF1BF89308F218069D408AB255D7B95986CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1554 997968-9979aa 1557 9979ac-9979ae 1554->1557 1558 9979b0 1554->1558 1559 9979b5-9979c0 1557->1559 1558->1559 1560 997a21-997a2e 1559->1560 1561 9979c2-9979f3 RtlEncodePointer 1559->1561 1563 9979fc-997a1c 1561->1563 1564 9979f5-9979fb 1561->1564 1563->1560 1564->1563
                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 009979E2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263659028.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_990000_P0A2249.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: e23229ac8a8919c9267fdef1f5a41aade5404d5d6302f8cf26da06137602e696
                                            • Instruction ID: 44bcd5e74466d7da0e46f37a05539bff16947ceac7bb8699e631e8abf2fe57ea
                                            • Opcode Fuzzy Hash: e23229ac8a8919c9267fdef1f5a41aade5404d5d6302f8cf26da06137602e696
                                            • Instruction Fuzzy Hash: 28117F7590030A8FDF50CFA9D9487AEBBF4FB49318F108429D449A7700CBB9A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1566 997c14-997c58 call 997a40 call 997a98 1571 997c5a-997c5c 1566->1571 1572 997c5e 1566->1572 1573 997c63-997c6b 1571->1573 1572->1573 1574 997c6d-997c9e RtlEncodePointer 1573->1574 1575 997cc7-997cd9 1573->1575 1577 997ca0-997ca6 1574->1577 1578 997ca7-997cbd 1574->1578 1577->1578 1578->1575
                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 00997C8D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263659028.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_990000_P0A2249.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: 2d1bb7524ca63cc82084b30dae29ed09a6fe0271d68fdec6bbda7ca2b9372693
                                            • Instruction ID: 1ea1aa61945c068cdfdeb13b75d476cd0b8ef68297167f1c74b4ff3252de5dd3
                                            • Opcode Fuzzy Hash: 2d1bb7524ca63cc82084b30dae29ed09a6fe0271d68fdec6bbda7ca2b9372693
                                            • Instruction Fuzzy Hash: 96113AB591460A8FCF10CF98D9443AABBF4FB08314F104429D455A7741DBB9A9448FA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263527801.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_94d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1665adde59c61dcbff8f2b68c586d0ed1c3b7b8f1410b7fab2bf8678121c415
                                            • Instruction ID: 3ce59dd3a0b2672b03cd2f7ca3f3e446a5af41374ff538efd6b7f8707b477942
                                            • Opcode Fuzzy Hash: a1665adde59c61dcbff8f2b68c586d0ed1c3b7b8f1410b7fab2bf8678121c415
                                            • Instruction Fuzzy Hash: B02129B9508200EFDB05CF50D4C4F26BBA5FB88318F24C9ADED094B246C37AD846CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263527801.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_94d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d627df96c3a9c6407b024cf887ec1294a02d770f00f70e73c9f758ced0290902
                                            • Instruction ID: 9b1446f21c182e30c0542ff98358acf8fd06113827459bd851baf947611e023d
                                            • Opcode Fuzzy Hash: d627df96c3a9c6407b024cf887ec1294a02d770f00f70e73c9f758ced0290902
                                            • Instruction Fuzzy Hash: D12129B9504240DFDB04DF10D8C4F26BBA5FB8431CF24C96DE9494B246C37AD846CB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263527801.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_94d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                            • Instruction ID: 36ef478419a8052843c4fbe0b2713d6c88618e4b605e8b98cbc5408426289933
                                            • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                            • Instruction Fuzzy Hash: D3119D79504280DFCB11CF14D5D4B15BBB1FB85328F28C6AED8494B656C33AD84ACBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.263527801.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_94d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                            • Instruction ID: 5e77f6673cab5ffdc0f6f9a356e2066068de40ba498da3c8732880ffa4b59ccf
                                            • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                            • Instruction Fuzzy Hash: AF119D79504280DFCB11CF50D5C4B15BBB1FB89324F28C6AADC494B65AC37AD84ACB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:11.1%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:40%
                                            Total number of Nodes:60
                                            Total number of Limit Nodes:2
                                            execution_graph 16211 15d5587 16212 15d55bf LdrInitializeThunk 16211->16212 16213 15d55ba 16211->16213 16214 15d5653 16212->16214 16213->16212 16215 15d3460 16216 15d347c 16215->16216 16217 15d3505 KiUserExceptionDispatcher 16216->16217 16240 15d6111 16217->16240 16218 15d3513 16244 15d83c9 16218->16244 16220 15d3604 16257 5a0e6d8 16220->16257 16261 5a0e6c8 16220->16261 16221 15d360b 16265 5a0eb30 16221->16265 16269 5a0eb20 16221->16269 16222 15d3612 16273 5a0ef79 16222->16273 16277 5a0ef88 16222->16277 16223 15d3619 16281 5a0f3e0 16223->16281 16285 5a0f3d0 16223->16285 16224 15d3620 16289 5a0f838 16224->16289 16293 5a0f828 16224->16293 16225 15d3627 16241 15d6142 KiUserExceptionDispatcher 16240->16241 16243 15d61fe 16241->16243 16243->16218 16247 15d83fa 16244->16247 16245 15d3536 16248 5a0e271 16245->16248 16253 5a0e280 16245->16253 16246 15d8549 KiUserExceptionDispatcher 16246->16247 16247->16245 16247->16246 16249 5a0e225 16248->16249 16250 5a0e27e 16248->16250 16249->16220 16251 5a0e33a KiUserExceptionDispatcher 16250->16251 16252 5a0e35c 16251->16252 16252->16220 16254 5a0e2a2 16253->16254 16255 5a0e33a KiUserExceptionDispatcher 16254->16255 16256 5a0e35c 16255->16256 16256->16220 16258 5a0e6fa KiUserExceptionDispatcher 16257->16258 16260 5a0e7b4 16258->16260 16260->16221 16262 5a0e6d8 KiUserExceptionDispatcher 16261->16262 16264 5a0e7b4 16262->16264 16264->16221 16266 5a0eb52 KiUserExceptionDispatcher 16265->16266 16268 5a0ec0c 16266->16268 16268->16222 16270 5a0eb52 KiUserExceptionDispatcher 16269->16270 16272 5a0ec0c 16270->16272 16272->16222 16274 5a0ef88 KiUserExceptionDispatcher 16273->16274 16276 5a0f064 16274->16276 16276->16223 16278 5a0efaa KiUserExceptionDispatcher 16277->16278 16280 5a0f064 16278->16280 16280->16223 16282 5a0f402 KiUserExceptionDispatcher 16281->16282 16284 5a0f4bc 16282->16284 16284->16224 16286 5a0f402 KiUserExceptionDispatcher 16285->16286 16288 5a0f4bc 16286->16288 16288->16224 16290 5a0f85a KiUserExceptionDispatcher 16289->16290 16292 5a0f914 16290->16292 16292->16225 16294 5a0f838 KiUserExceptionDispatcher 16293->16294 16296 5a0f914 16294->16296 16296->16225

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 658 15d5587-15d55b8 659 15d55bf-15d564c LdrInitializeThunk 658->659 660 15d55ba 658->660 661 15d5653-15d571b 659->661 660->659 668 15d5fb4-15d5fd3 661->668 669 15d5fd9-15d600e 668->669 670 15d5720-15d572c 668->670 672 15d572e 670->672 673 15d5733-15d5799 670->673 672->673 677 15d579b 673->677 678 15d57a0-15d582d 673->678 677->678 684 15d583f-15d5846 678->684 685 15d582f-15d5836 678->685 686 15d584d-15d585a 684->686 687 15d5848 684->687 688 15d583d 685->688 689 15d5838 685->689 690 15d585c 686->690 691 15d5861-15d5868 686->691 687->686 688->686 689->688 690->691 692 15d586f-15d58c6 691->692 693 15d586a 691->693 696 15d58cd-15d58e4 692->696 697 15d58c8 692->697 693->692 698 15d58ef-15d58f7 696->698 699 15d58e6-15d58ed 696->699 697->696 700 15d58f8-15d5902 698->700 699->700 701 15d5909-15d5912 700->701 702 15d5904 700->702 703 15d5f84-15d5f8a 701->703 702->701 704 15d5917-15d5923 703->704 705 15d5f90-15d5faa 703->705 706 15d592a-15d592f 704->706 707 15d5925 704->707 711 15d5fac 705->711 712 15d5fb1 705->712 708 15d5931-15d593d 706->708 709 15d5972-15d5974 706->709 707->706 714 15d593f 708->714 715 15d5944-15d5949 708->715 713 15d597a-15d598e 709->713 711->712 712->668 717 15d5994-15d59a9 713->717 718 15d5f62-15d5f6f 713->718 714->715 715->709 716 15d594b-15d5958 715->716 719 15d595f-15d5970 716->719 720 15d595a 716->720 721 15d59ab 717->721 722 15d59b0-15d5a30 717->722 723 15d5f70-15d5f7a 718->723 719->713 720->719 721->722 730 15d5a5a 722->730 731 15d5a32-15d5a58 722->731 724 15d5f7c 723->724 725 15d5f81 723->725 724->725 725->703 732 15d5a64-15d5a78 730->732 731->732 734 15d5a7e-15d5a88 732->734 735 15d5bc1-15d5bc6 732->735 736 15d5a8f-15d5aa9 734->736 737 15d5a8a 734->737 738 15d5bc8-15d5be8 735->738 739 15d5c2a-15d5c2c 735->739 741 15d5aab-15d5ab5 736->741 742 15d5ac0-15d5ac2 736->742 737->736 752 15d5bea-15d5c10 738->752 753 15d5c12 738->753 740 15d5c32-15d5c46 739->740 744 15d5f5c-15d5f5d 740->744 745 15d5c4c-15d5c56 740->745 747 15d5abc-15d5abf 741->747 748 15d5ab7 741->748 743 15d5b4c-15d5b58 742->743 754 15d5b5f-15d5b64 743->754 755 15d5b5a 743->755 751 15d5f5e-15d5f60 744->751 749 15d5c5d-15d5c77 745->749 750 15d5c58 745->750 747->742 748->747 759 15d5c8e-15d5c9c 749->759 760 15d5c79-15d5c83 749->760 750->749 751->723 756 15d5c1c-15d5c28 752->756 753->756 757 15d5b8b-15d5b8d 754->757 758 15d5b66-15d5b73 754->758 755->754 756->740 763 15d5b93-15d5ba1 757->763 761 15d5b7a-15d5b89 758->761 762 15d5b75 758->762 766 15d5d2c-15d5d38 759->766 764 15d5c8a-15d5c8d 760->764 765 15d5c85 760->765 761->763 762->761 768 15d5ac7-15d5adc 763->768 769 15d5ba7-15d5bbc 763->769 764->759 765->764 770 15d5d3f-15d5d44 766->770 771 15d5d3a 766->771 772 15d5ade 768->772 773 15d5ae3-15d5b41 768->773 769->751 774 15d5d6b-15d5d6d 770->774 775 15d5d46-15d5d53 770->775 771->770 772->773 794 15d5b48-15d5b4b 773->794 795 15d5b43 773->795 776 15d5d73-15d5d87 774->776 777 15d5d5a-15d5d69 775->777 778 15d5d55 775->778 779 15d5d8d-15d5df9 call 15d43f8 * 2 776->779 780 15d5ca1-15d5cb9 776->780 777->776 778->777 792 15d5dfb-15d5dfd 779->792 793 15d5e02-15d5f58 779->793 783 15d5cbb 780->783 784 15d5cc0-15d5d21 780->784 783->784 799 15d5d28-15d5d2b 784->799 800 15d5d23 784->800 796 15d5f59-15d5f5a 792->796 793->796 794->743 795->794 796->705 799->766 800->799
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: bdcd699c8c3b4c6cf6955f8de7d371d6fb60b02817d9ed532c8bf414e33e1789
                                            • Instruction ID: 49fd2f75aebab05fdf490483bb54bd4490f5c9498e2ab9b393f2b9f1de970aad
                                            • Opcode Fuzzy Hash: bdcd699c8c3b4c6cf6955f8de7d371d6fb60b02817d9ed532c8bf414e33e1789
                                            • Instruction Fuzzy Hash: 8262DF74E042298FDB64CF69C880BDDBBB2BB89305F1481E9D509AB355EB349E81CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 813 15d6111-15d6140 814 15d6147-15d620c KiUserExceptionDispatcher 813->814 815 15d6142 813->815 821 15d652a-15d655c 814->821 822 15d6212-15d622a 814->822 815->814 825 15d622c 822->825 826 15d6231-15d623a 822->826 825->826 827 15d651d-15d6523 826->827 828 15d623f-15d62b9 827->828 829 15d6529 827->829 834 15d62bf-15d632d 828->834 835 15d6375-15d63d0 828->835 829->821 844 15d632f-15d636f 834->844 845 15d6370-15d6373 834->845 846 15d63d1-15d641f call 15d43f8 * 2 835->846 844->845 845->846 853 15d6508-15d6513 846->853 854 15d6425-15d6507 846->854 855 15d651a 853->855 856 15d6515 853->856 854->853 855->827 856->855
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 015D61EC
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 1946c2451a56f640b2bc738b400510acc91bbae5123773727dc13a77e3adfa63
                                            • Instruction ID: b7731c87114f4cbbb984154a084e09a822083c33d15a583abb4c821d3a57c2ca
                                            • Opcode Fuzzy Hash: 1946c2451a56f640b2bc738b400510acc91bbae5123773727dc13a77e3adfa63
                                            • Instruction Fuzzy Hash: 23D1AF74E00218CFDB24DFA9D944B9DBBB2FB89305F2081A9D809AB355DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 869 15d83c9-15d83f8 870 15d83ff-15d84c2 call 15d66f8 call 15d6b88 869->870 871 15d83fa 869->871 880 15d84c8-15d84e0 870->880 881 15d87e0-15d8812 870->881 871->870 884 15d84e7-15d84f0 880->884 885 15d84e2 880->885 886 15d87d3-15d87d9 884->886 885->884 887 15d87df 886->887 888 15d84f5-15d856f KiUserExceptionDispatcher 886->888 887->881 892 15d862b-15d8686 888->892 893 15d8575-15d85e3 888->893 904 15d8687-15d86d5 call 15d43f8 * 2 892->904 902 15d85e5-15d8625 893->902 903 15d8626-15d8629 893->903 902->903 903->904 911 15d87be-15d87c9 904->911 912 15d86db-15d87bd 904->912 913 15d87cb 911->913 914 15d87d0 911->914 912->911 913->914 914->886
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 015D855B
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 6234f7de096b6578d3ac7c3ce0c4198e83fe52596d0f755e6945d87524d9576a
                                            • Instruction ID: babb2793ae0e7162aead3c3cd9858380ba48cafbbddb170a84f1c4e7d25c5536
                                            • Opcode Fuzzy Hash: 6234f7de096b6578d3ac7c3ce0c4198e83fe52596d0f755e6945d87524d9576a
                                            • Instruction Fuzzy Hash: D0C1A074E01218CFDB24DFA9D984B9DBBB2FB88305F2081A9D809AB354DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1109 5a0ef88-5a0efa8 1110 5a0efaa 1109->1110 1111 5a0efaf-5a0f05c KiUserExceptionDispatcher 1109->1111 1110->1111 1116 5a0f064-5a0f072 1111->1116 1117 5a0f078-5a0f08f call 5a02958 1116->1117 1118 5a0f38a-5a0f3bc 1116->1118 1122 5a0f091 1117->1122 1123 5a0f096-5a0f09f 1117->1123 1122->1123 1124 5a0f37d-5a0f383 1123->1124 1125 5a0f0a4-5a0f11a call 5a02ad8 * 3 call 5a02fd8 1124->1125 1126 5a0f389 1124->1126 1135 5a0f120-5a0f18e 1125->1135 1136 5a0f1d6-5a0f230 call 5a02ad8 1125->1136 1126->1118 1146 5a0f190-5a0f1d0 1135->1146 1147 5a0f1d1-5a0f1d4 1135->1147 1148 5a0f231-5a0f27f 1136->1148 1146->1147 1147->1148 1153 5a0f285-5a0f367 1148->1153 1154 5a0f368-5a0f373 1148->1154 1153->1154 1155 5a0f375 1154->1155 1156 5a0f37a 1154->1156 1155->1156 1156->1124
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F053
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: b221f78b07ea43a75f6f4c7bb3a1b36bfbbfb58db5903b3ddfb707c979cddd67
                                            • Instruction ID: 616c21d7c73210dfcdce485ccbb115542a33cbe2f2b27ca4276fecc8787b0682
                                            • Opcode Fuzzy Hash: b221f78b07ea43a75f6f4c7bb3a1b36bfbbfb58db5903b3ddfb707c979cddd67
                                            • Instruction Fuzzy Hash: F8C19E74E002188FDB24DFA5D954BADBBB2EF89304F2091A9D809AB394DB395D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1169 5a0f3e0-5a0f400 1170 5a0f402 1169->1170 1171 5a0f407-5a0f4b4 KiUserExceptionDispatcher 1169->1171 1170->1171 1176 5a0f4bc-5a0f4ca 1171->1176 1177 5a0f4d0-5a0f4e7 call 5a02958 1176->1177 1178 5a0f7e2-5a0f814 1176->1178 1182 5a0f4e9 1177->1182 1183 5a0f4ee-5a0f4f7 1177->1183 1182->1183 1184 5a0f7d5-5a0f7db 1183->1184 1185 5a0f7e1 1184->1185 1186 5a0f4fc-5a0f572 call 5a02ad8 * 3 call 5a02fd8 1184->1186 1185->1178 1195 5a0f578-5a0f5e6 1186->1195 1196 5a0f62e-5a0f688 call 5a02ad8 1186->1196 1206 5a0f5e8-5a0f628 1195->1206 1207 5a0f629-5a0f62c 1195->1207 1208 5a0f689-5a0f6d7 1196->1208 1206->1207 1207->1208 1213 5a0f7c0-5a0f7cb 1208->1213 1214 5a0f6dd-5a0f7bf 1208->1214 1216 5a0f7d2 1213->1216 1217 5a0f7cd 1213->1217 1214->1213 1216->1184 1217->1216
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F4AB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 288fa13cfa35aef94feca74cbf3f84747e6c32bac06b4c9235a2521cf081dc00
                                            • Instruction ID: b2142d52a809eaf98d76a95ac59d8077ab65dd5cd3d9f2861d8029a9182a1eb3
                                            • Opcode Fuzzy Hash: 288fa13cfa35aef94feca74cbf3f84747e6c32bac06b4c9235a2521cf081dc00
                                            • Instruction Fuzzy Hash: 0CC18F74E00218CFDB24DFA5D954BADBBB2FB89304F2091A9D809AB394DB355E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1049 5a0eb30-5a0eb50 1050 5a0eb52 1049->1050 1051 5a0eb57-5a0ec04 KiUserExceptionDispatcher 1049->1051 1050->1051 1056 5a0ec0c-5a0ec1a 1051->1056 1057 5a0ec20-5a0ec37 call 5a02958 1056->1057 1058 5a0ef32-5a0ef64 1056->1058 1062 5a0ec39 1057->1062 1063 5a0ec3e-5a0ec47 1057->1063 1062->1063 1064 5a0ef25-5a0ef2b 1063->1064 1065 5a0ef31 1064->1065 1066 5a0ec4c-5a0ecc2 call 5a02ad8 * 3 call 5a02fd8 1064->1066 1065->1058 1075 5a0ecc8-5a0ed36 1066->1075 1076 5a0ed7e-5a0edd8 call 5a02ad8 1066->1076 1086 5a0ed38-5a0ed78 1075->1086 1087 5a0ed79-5a0ed7c 1075->1087 1088 5a0edd9-5a0ee27 1076->1088 1086->1087 1087->1088 1093 5a0ef10-5a0ef1b 1088->1093 1094 5a0ee2d-5a0ef0f 1088->1094 1096 5a0ef22 1093->1096 1097 5a0ef1d 1093->1097 1094->1093 1096->1064 1097->1096
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0EBFB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: d25ff7c2deb758897b71c814742354f2e42e0b1e74fb14b453b62a8d85521e90
                                            • Instruction ID: 48b0bd26a27a3b93c808d1c4709d9f82e97c8a4f568ab121c6ce26eb34a1dfeb
                                            • Opcode Fuzzy Hash: d25ff7c2deb758897b71c814742354f2e42e0b1e74fb14b453b62a8d85521e90
                                            • Instruction Fuzzy Hash: 47C18E74E002188FDB24DFA5D954BADBBB2FB89304F2091A9D809AB394DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 927 5a0e280-5a0e2a0 928 5a0e2a2 927->928 929 5a0e2a7-5a0e332 927->929 928->929 987 5a0e335 call 15d66f8 929->987 988 5a0e335 call 15d66e8 929->988 933 5a0e33a-5a0e354 KiUserExceptionDispatcher 934 5a0e35c-5a0e36a 933->934 935 5a0e370-5a0e387 call 5a02958 934->935 936 5a0e682-5a0e6b4 934->936 940 5a0e389 935->940 941 5a0e38e-5a0e397 935->941 940->941 942 5a0e675-5a0e67b 941->942 943 5a0e681 942->943 944 5a0e39c-5a0e412 call 5a02ad8 * 3 call 5a02fd8 942->944 943->936 953 5a0e418-5a0e486 944->953 954 5a0e4ce-5a0e528 call 5a02ad8 944->954 964 5a0e488-5a0e4c8 953->964 965 5a0e4c9-5a0e4cc 953->965 966 5a0e529-5a0e577 954->966 964->965 965->966 971 5a0e660-5a0e66b 966->971 972 5a0e57d-5a0e65f 966->972 973 5a0e672 971->973 974 5a0e66d 971->974 972->971 973->942 974->973 987->933 988->933
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0E34B
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: c5886ec02b53bdfb74520a12a283b27ced4ff01717e4f308181f526f25187329
                                            • Instruction ID: ed38147d34959e547a6e43e66a2524d9e57d2433c48d8bafda4db244302b5a32
                                            • Opcode Fuzzy Hash: c5886ec02b53bdfb74520a12a283b27ced4ff01717e4f308181f526f25187329
                                            • Instruction Fuzzy Hash: E0C18E74E00218CFDB24DFA5D954BADBBB2FB89304F2091A9D809AB394DB355E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 989 5a0e6d8-5a0e6f8 990 5a0e6fa 989->990 991 5a0e6ff-5a0e7ac KiUserExceptionDispatcher 989->991 990->991 996 5a0e7b4-5a0e7c2 991->996 997 5a0e7c8-5a0e7df call 5a02958 996->997 998 5a0eada-5a0eb0c 996->998 1002 5a0e7e1 997->1002 1003 5a0e7e6-5a0e7ef 997->1003 1002->1003 1004 5a0eacd-5a0ead3 1003->1004 1005 5a0e7f4-5a0e86a call 5a02ad8 * 3 call 5a02fd8 1004->1005 1006 5a0ead9 1004->1006 1015 5a0e870-5a0e8de 1005->1015 1016 5a0e926-5a0e980 call 5a02ad8 1005->1016 1006->998 1027 5a0e8e0-5a0e920 1015->1027 1028 5a0e921-5a0e924 1015->1028 1026 5a0e981-5a0e9cf 1016->1026 1033 5a0e9d5-5a0eab7 1026->1033 1034 5a0eab8-5a0eac3 1026->1034 1027->1028 1028->1026 1033->1034 1036 5a0eac5 1034->1036 1037 5a0eaca 1034->1037 1036->1037 1037->1004
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0E7A3
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 68ed7d1fbe0aa7183782f9f924b7869c1fc8bb67990bd0f59471f854059cfcfe
                                            • Instruction ID: 878d9fe69385c21258721806f34ee355ea6e457c3ca33f51b7970a43581be27e
                                            • Opcode Fuzzy Hash: 68ed7d1fbe0aa7183782f9f924b7869c1fc8bb67990bd0f59471f854059cfcfe
                                            • Instruction Fuzzy Hash: CCC18F74E002188FDB24DFA5D954BADBBB2FB89304F2091A9D409AB394DB355D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1229 5a0f838-5a0f858 1230 5a0f85a 1229->1230 1231 5a0f85f-5a0f90c KiUserExceptionDispatcher 1229->1231 1230->1231 1236 5a0f914-5a0f922 1231->1236 1237 5a0f928-5a0f93f call 5a02958 1236->1237 1238 5a0fc3a-5a0fc6c 1236->1238 1242 5a0f941 1237->1242 1243 5a0f946-5a0f94f 1237->1243 1242->1243 1244 5a0fc2d-5a0fc33 1243->1244 1245 5a0f954-5a0f9ca call 5a02ad8 * 3 call 5a02fd8 1244->1245 1246 5a0fc39 1244->1246 1255 5a0f9d0-5a0fa3e 1245->1255 1256 5a0fa86-5a0fae0 call 5a02ad8 1245->1256 1246->1238 1266 5a0fa40-5a0fa80 1255->1266 1267 5a0fa81-5a0fa84 1255->1267 1268 5a0fae1-5a0fb2f 1256->1268 1266->1267 1267->1268 1273 5a0fb35-5a0fc17 1268->1273 1274 5a0fc18-5a0fc23 1268->1274 1273->1274 1276 5a0fc25 1274->1276 1277 5a0fc2a 1274->1277 1276->1277 1277->1244
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F903
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: e25d194d3610e233eb0fc28cc873a9ff03f6193fc4c0e83aea8dd325338205d1
                                            • Instruction ID: 62f2a56fefc43d590f86755923661c0d748d5d807a589c543e9a71435192694a
                                            • Opcode Fuzzy Hash: e25d194d3610e233eb0fc28cc873a9ff03f6193fc4c0e83aea8dd325338205d1
                                            • Instruction Fuzzy Hash: 68C18F74E10218CFDB24DFA5D954BADBBB2FB89304F2091A9D809AB394DB395D85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1289 15de758-15de778 1290 15de77f-15de78b 1289->1290 1291 15de77a 1289->1291 1294 15de78d 1290->1294 1295 15de792-15de7a7 1290->1295 1292 15de8ab-15de8b5 1291->1292 1294->1292 1298 15de7ad-15de7b8 1295->1298 1299 15de8bb-15de8fb call 15d4268 1295->1299 1302 15de7be-15de7c5 1298->1302 1303 15de8b6 1298->1303 1315 15de902-15de98d call 15d4268 call 15d4160 1299->1315 1304 15de7c7-15de7de 1302->1304 1305 15de7f2-15de7fd 1302->1305 1303->1299 1314 15de7e4-15de7e7 1304->1314 1304->1315 1310 15de7ff-15de807 1305->1310 1311 15de80a-15de814 1305->1311 1310->1311 1321 15de89e-15de8a3 1311->1321 1322 15de81a-15de824 1311->1322 1314->1303 1319 15de7ed-15de7f0 1314->1319 1349 15de98f-15de993 1315->1349 1350 15de995-15de99b 1315->1350 1319->1304 1319->1305 1321->1292 1322->1303 1327 15de82a-15de846 1322->1327 1332 15de848 1327->1332 1333 15de84a-15de84d 1327->1333 1332->1292 1334 15de84f-15de852 1333->1334 1335 15de854-15de857 1333->1335 1338 15de85a-15de868 1334->1338 1335->1338 1338->1303 1343 15de86a-15de871 1338->1343 1343->1292 1344 15de873-15de879 1343->1344 1344->1303 1346 15de87b-15de880 1344->1346 1346->1303 1347 15de882-15de895 1346->1347 1347->1303 1352 15de897-15de89a 1347->1352 1349->1350 1353 15de99d-15de9a1 1349->1353 1354 15de9c2-15de9c3 1350->1354 1352->1344 1355 15de89c 1352->1355 1356 15de9c4-15dea00 1353->1356 1357 15de9a3-15de9aa 1353->1357 1355->1292 1362 15dea07-15deaac call 15d66f8 call 15d6b88 1356->1362 1363 15dea02 1356->1363 1358 15de9ac-15de9b1 1357->1358 1359 15de9b3-15de9be 1357->1359 1358->1359 1361 15de9c0 1358->1361 1359->1354 1361->1354 1371 15deab1-15deacb 1362->1371 1363->1362 1373 15dead1-15deae8 1371->1373 1374 15dede3-15dee15 1371->1374 1377 15deaef-15deaf8 1373->1377 1378 15deaea 1373->1378 1379 15dedd6-15deddc 1377->1379 1378->1377 1380 15deafd-15deb73 1379->1380 1381 15dede2 1379->1381 1386 15dec2f-15dec89 1380->1386 1387 15deb79-15debe7 1380->1387 1381->1374 1398 15dec8a-15decd8 call 15d43f8 * 2 1386->1398 1396 15debe9-15dec29 1387->1396 1397 15dec2a-15dec2d 1387->1397 1396->1397 1397->1398 1405 15decde-15dedc0 1398->1405 1406 15dedc1-15dedcc 1398->1406 1405->1406 1408 15dedce 1406->1408 1409 15dedd3 1406->1409 1408->1409 1409->1379
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D0%l
                                            • API String ID: 0-3182299250
                                            • Opcode ID: e9d945ed416f54ce2c75fabaadb9e21c5c3b5263de430124470134c68fd5a47a
                                            • Instruction ID: 2643d3f71670cb0141508911dd48ebc0aa095fa5628c6716c4b60b775164b88d
                                            • Opcode Fuzzy Hash: e9d945ed416f54ce2c75fabaadb9e21c5c3b5263de430124470134c68fd5a47a
                                            • Instruction Fuzzy Hash: 8D124534E002188FDB25DFA8C9557AEBBB2FF89304F1080A9C509AB395DB359D86CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1751 5a0e271-5a0e27c 1752 5a0e225-5a0e234 1751->1752 1753 5a0e27e-5a0e2a0 1751->1753 1755 5a0e2a2 1753->1755 1756 5a0e2a7-5a0e332 1753->1756 1755->1756 1815 5a0e335 call 15d66f8 1756->1815 1816 5a0e335 call 15d66e8 1756->1816 1761 5a0e33a-5a0e354 KiUserExceptionDispatcher 1762 5a0e35c-5a0e36a 1761->1762 1763 5a0e370-5a0e387 call 5a02958 1762->1763 1764 5a0e682-5a0e6b4 1762->1764 1768 5a0e389 1763->1768 1769 5a0e38e-5a0e397 1763->1769 1768->1769 1770 5a0e675-5a0e67b 1769->1770 1771 5a0e681 1770->1771 1772 5a0e39c-5a0e412 call 5a02ad8 * 3 call 5a02fd8 1770->1772 1771->1764 1781 5a0e418-5a0e486 1772->1781 1782 5a0e4ce-5a0e528 call 5a02ad8 1772->1782 1792 5a0e488-5a0e4c8 1781->1792 1793 5a0e4c9-5a0e4cc 1781->1793 1794 5a0e529-5a0e577 1782->1794 1792->1793 1793->1794 1799 5a0e660-5a0e66b 1794->1799 1800 5a0e57d-5a0e65f 1794->1800 1801 5a0e672 1799->1801 1802 5a0e66d 1799->1802 1800->1799 1801->1770 1802->1801 1815->1761 1816->1761
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0E34B
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: b8ef200cab331f68e16cfabc15a5076594b7b3fef6296a7d2246f455a8272dc2
                                            • Instruction ID: 63f1b5720f23a6eb0493cd954ed10760500bc47ac5943fcc70e2931362fee277
                                            • Opcode Fuzzy Hash: b8ef200cab331f68e16cfabc15a5076594b7b3fef6296a7d2246f455a8272dc2
                                            • Instruction Fuzzy Hash: 2441E674E05208CBDB18CFAAE954BEDBBB6BF89304F20D12AC414BB294DB345946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F4AB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: e427acc2d89034335ca6784951ce7621ba31abebc2a93c840d3a3339c9dbacf2
                                            • Instruction ID: 4b683402360d7a79f9c2debc3c04190594de07823ad8cf68b30395e9effe86ab
                                            • Opcode Fuzzy Hash: e427acc2d89034335ca6784951ce7621ba31abebc2a93c840d3a3339c9dbacf2
                                            • Instruction Fuzzy Hash: 0941C370E01208CFDB18CFAAD554AEEBBB2BF89304F20D12AC515BB294DB355946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0EBFB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 910ec591b70f9cc2b2fa76081b5dff6962f1e4714cddb0f0d1d84132878c7265
                                            • Instruction ID: d7a4c9557d58ef986af44a1e9ed8ee2fcfa6b0fc2646b30ad506989afb58eb42
                                            • Opcode Fuzzy Hash: 910ec591b70f9cc2b2fa76081b5dff6962f1e4714cddb0f0d1d84132878c7265
                                            • Instruction Fuzzy Hash: 1F41C570E056488BDB18CFAAD554AEEBBF2BF89304F24D12AC415BB294DB355946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F053
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: f48b460c7868940bdbfae3e1efa089da0eda658516a0b505654ad2ec7c06bc4e
                                            • Instruction ID: 254b3fd0a070835988e4770c20ea1c2028a1a6eb8eceec654cd6e289c26b295d
                                            • Opcode Fuzzy Hash: f48b460c7868940bdbfae3e1efa089da0eda658516a0b505654ad2ec7c06bc4e
                                            • Instruction Fuzzy Hash: 2441B374E052488BDB18DFAAD95479EBBB2BF89304F24D12AC414BB294EB355946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0E7A3
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 8d220fd5b081577f3ad6be3189fb6a574e8e16dcf8075e005eeb8ac4a44ec968
                                            • Instruction ID: 7f5ef3133bcd6ae1b9b3afa1184ad5c8f9f55ce3c90bb135e1b05719aca631ae
                                            • Opcode Fuzzy Hash: 8d220fd5b081577f3ad6be3189fb6a574e8e16dcf8075e005eeb8ac4a44ec968
                                            • Instruction Fuzzy Hash: F041D470E052088BDB18DFAAD954BDEBBF6BF89304F24D129C414BB294EB345946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 05A0F903
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 0e963ede78342bb67ba6e4471d60f9593f2a32064c6d4bd66ec33d17d6cf46d1
                                            • Instruction ID: 3af24f1a2f6ca6f31a9990ac644f70a1a31d251c4eeb0b212a9df8faeb2fe97e
                                            • Opcode Fuzzy Hash: 0e963ede78342bb67ba6e4471d60f9593f2a32064c6d4bd66ec33d17d6cf46d1
                                            • Instruction Fuzzy Hash: 7941C370E052488BDB18DFAAD954BDEBBF2BF89304F20D129C415BB294EB355946CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7fab9464a7e363e231a5154a5abaca4ffc88c687fecbae140a8f675c04e6fad
                                            • Instruction ID: 80b03601dacd180c74662b61a373c14d962ebfe5712038b1631c2cc02b8b8e5d
                                            • Opcode Fuzzy Hash: a7fab9464a7e363e231a5154a5abaca4ffc88c687fecbae140a8f675c04e6fad
                                            • Instruction Fuzzy Hash: 8AE1F174E01218CFDB64CFA5D844BADBBB2FB89314F1081AAD809AB354DB356E85CF50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 40f80447a50b19ad092424cbe26aa8f1ebc62cd41f6a00e2ab4f0c3e0c63ea79
                                            • Instruction ID: ce9edcd7f25c7f61cf03e69909069a46c9826d196063eadc879df6986ade1a86
                                            • Opcode Fuzzy Hash: 40f80447a50b19ad092424cbe26aa8f1ebc62cd41f6a00e2ab4f0c3e0c63ea79
                                            • Instruction Fuzzy Hash: 9AC19F74E002188FDB24DFA9D954B9DBBB2FF89304F2081AAD809AB354DB355D86CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00dbe7e4678f4bbe66f346cb54b5b6fafcb23596c9fc3409c377fab876a3eb13
                                            • Instruction ID: 3c92316f75185dc8951804e60f770737c991474caef23a6300a5bbd0ddec1a4d
                                            • Opcode Fuzzy Hash: 00dbe7e4678f4bbe66f346cb54b5b6fafcb23596c9fc3409c377fab876a3eb13
                                            • Instruction Fuzzy Hash: 16D1A174E01218CFDB24DFA9D944B9DBBB2FB88305F1081A9D809AB355DB355D85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 989f3ff889a33677952c7db8be9991197081e65f4d98eea5f7f8d5cd751c8199
                                            • Instruction ID: 3a62c439a549cc80f9470a1d242fb74850226e2e1f7ada0add5901de47b5ca2f
                                            • Opcode Fuzzy Hash: 989f3ff889a33677952c7db8be9991197081e65f4d98eea5f7f8d5cd751c8199
                                            • Instruction Fuzzy Hash: D5C18E74E002188FDB24DFA9D954B9DBBB2FF89304F1081AAD909AB354DB355E86CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4764c0ed533e20f4e1d14d77aefd78d122d6c151576f47e0f1aa6c796aa22989
                                            • Instruction ID: 0309ebb3f7a2945e3c266983effdcfcdc67c7e892fbf13bb105169ae0c641240
                                            • Opcode Fuzzy Hash: 4764c0ed533e20f4e1d14d77aefd78d122d6c151576f47e0f1aa6c796aa22989
                                            • Instruction Fuzzy Hash: 81D1A074E01218CFDB24DFA9D944BADBBB2FB88305F2081A9D909AB354DB355D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f6651c2ddf69c0637a5261518ec7de25d98b67a2a456ef8e644012406d6e0bc
                                            • Instruction ID: f9cf82e03687a7c915039a573a4a1090dadd16cc73bf386a716809998ea1d74b
                                            • Opcode Fuzzy Hash: 3f6651c2ddf69c0637a5261518ec7de25d98b67a2a456ef8e644012406d6e0bc
                                            • Instruction Fuzzy Hash: 67C19F74E002188FDB24DFA9D994B9DBBB2FF89304F2081A9D409AB355DB355E86CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de614d3e02428e1902032a8aaa343f1ef8952d13e7c4f0b2157bd8a5e8e9a344
                                            • Instruction ID: e8228907bf3132f94aaddc6e5e8a2419b37b62252288995ac09c505020591609
                                            • Opcode Fuzzy Hash: de614d3e02428e1902032a8aaa343f1ef8952d13e7c4f0b2157bd8a5e8e9a344
                                            • Instruction Fuzzy Hash: 03C18F74E002188FDB24DFA9D954B9DBBB2FF89304F2080AAD909AB355DB355D86CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cee3cde81ff81791e414daff1a48bd755e3d4276959609fad3b5a2e83fc4c14f
                                            • Instruction ID: 0e2faff62f851a19bcbc0e51e7a9835525cb2f5ea01619b071fe03bb9ee0347b
                                            • Opcode Fuzzy Hash: cee3cde81ff81791e414daff1a48bd755e3d4276959609fad3b5a2e83fc4c14f
                                            • Instruction Fuzzy Hash: 5DC19F74E01218CFDB24DFA9D944BADBBB2FB89305F2081A9D809AB354DB355E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3eed83f1e0c72fbddce68411345ae39f6a489de22794da6ff0948fa7a2ca2c49
                                            • Instruction ID: cde3a4fbd2da187dac5dbef31d627f1445a3ebcc5fa8c1a39d753ace8e495605
                                            • Opcode Fuzzy Hash: 3eed83f1e0c72fbddce68411345ae39f6a489de22794da6ff0948fa7a2ca2c49
                                            • Instruction Fuzzy Hash: C8A10370E012088FEB24DFA9C884BDDBBB1FF89304F209269D508AB291DB749985CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bad28ededbff8e2deb3bb9e3060c6570c002a71b212d75e97d9617f4f3ba7526
                                            • Instruction ID: fd2a971988213740437abbfe03b22394221519c8e3b63353fd8a526c8b223d0e
                                            • Opcode Fuzzy Hash: bad28ededbff8e2deb3bb9e3060c6570c002a71b212d75e97d9617f4f3ba7526
                                            • Instruction Fuzzy Hash: 04A1F270D01208CFEB24DFA9C844BEDBBB1FF89314F209269D508AB295DB749985CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc5e96532d6e74d37354d7759c6acf30b05a45c3527c0dab4ac2c2b18ebcffac
                                            • Instruction ID: cd7732ce3b3d261e0f6ff4036c30e6b182616935bfd9fdf73c4803a0d87cdae4
                                            • Opcode Fuzzy Hash: bc5e96532d6e74d37354d7759c6acf30b05a45c3527c0dab4ac2c2b18ebcffac
                                            • Instruction Fuzzy Hash: C2910470D00218CFEB24DFA8C884BEDBBB1FF49314F209269E549AB291DB759985CF15
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1421 15d3450-15d345c 1422 15d345e-15d347a 1421->1422 1423 15d34b6-15d34e2 1421->1423 1426 15d347c 1422->1426 1427 15d3481-15d34b1 1422->1427 1438 15d34e9 1423->1438 1426->1427 1427->1423 1525 15d34ea call 15d3938 1438->1525 1526 15d34ea call 15d3928 1438->1526 1527 15d34ea call 15d3994 1438->1527 1440 15d34f0-15d34f7 1442 15d34fe-15d35d0 call 15d4859 KiUserExceptionDispatcher call 15d6111 call 15d71da call 15d76a8 call 15d7b08 call 15d7f68 call 15d83c9 1440->1442 1472 15d35d7-15d35da 1442->1472 1473 15d35e1-15d35ef 1472->1473 1476 15d35f6 1473->1476 1477 15d35fd 1476->1477 1508 15d35fe call 5a0e280 1477->1508 1509 15d35fe call 5a0e271 1477->1509 1478 15d3604 1510 15d3605 call 5a0e6c8 1478->1510 1511 15d3605 call 5a0e6d8 1478->1511 1479 15d360b 1512 15d360c call 5a0eb20 1479->1512 1513 15d360c call 5a0eb30 1479->1513 1480 15d3612 1514 15d3613 call 5a0ef88 1480->1514 1515 15d3613 call 5a0ef79 1480->1515 1481 15d3619 1516 15d361a call 5a0f3e0 1481->1516 1517 15d361a call 5a0f3d0 1481->1517 1482 15d3620 1518 15d3621 call 5a0f828 1482->1518 1519 15d3621 call 5a0f838 1482->1519 1483 15d3627 1484 15d362e-15d36ac call 15de758 call 15dee28 call 15df280 call 15df6d8 call 15dfb30 1483->1484 1503 15d36b3 1484->1503 1504 15d36ba-15d36c1 1503->1504 1506 15d36c8-15d36f3 1504->1506 1508->1478 1509->1478 1510->1479 1511->1479 1512->1480 1513->1480 1514->1481 1515->1481 1516->1482 1517->1482 1518->1483 1519->1483 1525->1440 1526->1440 1527->1440
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 015D3506
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 9eadfa84dc0c4aee2d7733f3b476a595a273b2b7d73af775d8ad45d700a1382b
                                            • Instruction ID: 959b9fa9a23d7c262bfcc957a3307b274396ad90b37383e84cc1b7e427dd747a
                                            • Opcode Fuzzy Hash: 9eadfa84dc0c4aee2d7733f3b476a595a273b2b7d73af775d8ad45d700a1382b
                                            • Instruction Fuzzy Hash: B951E1785317028FD3627BA0AEAC17F7FB5FB4F393B42BC05A00A820488B3405A9CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1535 15d3460-15d347a 1536 15d347c 1535->1536 1537 15d3481-15d34e9 1535->1537 1536->1537 1637 15d34ea call 15d3938 1537->1637 1638 15d34ea call 15d3928 1537->1638 1639 15d34ea call 15d3994 1537->1639 1552 15d34f0-15d35fd call 15d4859 KiUserExceptionDispatcher call 15d6111 call 15d71da call 15d76a8 call 15d7b08 call 15d7f68 call 15d83c9 1620 15d35fe call 5a0e280 1552->1620 1621 15d35fe call 5a0e271 1552->1621 1590 15d3604 1622 15d3605 call 5a0e6c8 1590->1622 1623 15d3605 call 5a0e6d8 1590->1623 1591 15d360b 1624 15d360c call 5a0eb20 1591->1624 1625 15d360c call 5a0eb30 1591->1625 1592 15d3612 1626 15d3613 call 5a0ef88 1592->1626 1627 15d3613 call 5a0ef79 1592->1627 1593 15d3619 1628 15d361a call 5a0f3e0 1593->1628 1629 15d361a call 5a0f3d0 1593->1629 1594 15d3620 1630 15d3621 call 5a0f828 1594->1630 1631 15d3621 call 5a0f838 1594->1631 1595 15d3627-15d36c1 call 15de758 call 15dee28 call 15df280 call 15df6d8 call 15dfb30 1618 15d36c8-15d36f3 1595->1618 1620->1590 1621->1590 1622->1591 1623->1591 1624->1592 1625->1592 1626->1593 1627->1593 1628->1594 1629->1594 1630->1595 1631->1595 1637->1552 1638->1552 1639->1552
                                            APIs
                                            • KiUserExceptionDispatcher.NTDLL ref: 015D3506
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID: DispatcherExceptionUser
                                            • String ID:
                                            • API String ID: 6842923-0
                                            • Opcode ID: 2273431085f8b62d1d98a987adefb3567eb53cbb66e84215a9a3a5acef3d8563
                                            • Instruction ID: bd991a8593262734d55bcb6a3b706f6933031b48e9d4e776857e6f7d9e242413
                                            • Opcode Fuzzy Hash: 2273431085f8b62d1d98a987adefb3567eb53cbb66e84215a9a3a5acef3d8563
                                            • Instruction Fuzzy Hash: B351C178531706CFD3227BA0AEAC17FBBB9FB4F393B42BC01A50A925489B740565CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.506788523.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_126d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 150c15daaed073e4308146c6e8bdaf8465b7662687263dfd8ad5c9f59e1228a2
                                            • Instruction ID: ffc7548cbe63642f8a285c843ae5fbd5c5fefec04f467154472da178a5d820fb
                                            • Opcode Fuzzy Hash: 150c15daaed073e4308146c6e8bdaf8465b7662687263dfd8ad5c9f59e1228a2
                                            • Instruction Fuzzy Hash: 242178B161420CDFCB11CF54E8C0F26BFA9FB88318F24856DE9454B686C376D886CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.506788523.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_126d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5af0ca37ea7f5c80fd72a36b414aa61eacc2b10696c435e3245b12668d72ef4e
                                            • Instruction ID: 5a4165ea9122cdee5b41fbe57a676ef00d3d13dd9fc40d60146fa4874400c749
                                            • Opcode Fuzzy Hash: 5af0ca37ea7f5c80fd72a36b414aa61eacc2b10696c435e3245b12668d72ef4e
                                            • Instruction Fuzzy Hash: 0F2136B1614248DFDB05CF54D8C0B66BB69FB88324F24C569EA454B286C376E886C7A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.506788523.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_126d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                            • Instruction ID: 8909ab75929dfabbb4b4a0eba4d596c644e678eb7c32690897394543b766f6d8
                                            • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                            • Instruction Fuzzy Hash: C711E176504288CFCB12CF04D5C4B16BF71FB88324F2886A9D9450B657C336D49ACBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.506788523.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_126d000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                            • Instruction ID: 1a73c4fdc6fc4cb546aea34b7ee0d836ca0bc0d95eadeeb81c3b2f869be46c54
                                            • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                            • Instruction Fuzzy Hash: DA110376504288CFCB12CF54D5C4B56BF71FB84324F28C6A9D9440B65BC33AE896CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c23a058add1fe93e98a4940c7ea7b9d34a0afec591d46d12130b33924b5c4dc
                                            • Instruction ID: 3352f27aaa870caabce9a6ab98ed26f1a167d433fef84628121561477fef006c
                                            • Opcode Fuzzy Hash: 5c23a058add1fe93e98a4940c7ea7b9d34a0afec591d46d12130b33924b5c4dc
                                            • Instruction Fuzzy Hash: 70529B74A01228CFDB68CF69C884BDDBBB2BB89305F1081E9D509AB354DB359E85CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4df514e19d502c6861856670163fb1a28693ff907d53f14ecc1729f221d7a0bc
                                            • Instruction ID: 3b7072d865ea0931da68cbb3e6f0cd5d8b86d6c66ff3e69c5e6d6c3d9ccdd3fc
                                            • Opcode Fuzzy Hash: 4df514e19d502c6861856670163fb1a28693ff907d53f14ecc1729f221d7a0bc
                                            • Instruction Fuzzy Hash: 7FC18F74E002188FDB24DFA5D994BADBBB2FF89304F2091A9D409AB394DB355D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3879cd874056892a64812a0a5a23f9094f311ac32507d75f506bbc40704e7334
                                            • Instruction ID: 527b22c88216b8558e52c74b14900ed2684d813365110e59fc8f06c8f10b8c2a
                                            • Opcode Fuzzy Hash: 3879cd874056892a64812a0a5a23f9094f311ac32507d75f506bbc40704e7334
                                            • Instruction Fuzzy Hash: AFC18F74E002188FDB24DFA5D954B9DBBB2FB89304F2091A9D409AB394DB356D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8201f168c6f6582cf072fd6925d341ece78d9b11dbfcf64f435333d10feaf4ce
                                            • Instruction ID: c35a7720b55919d20803e064a2e81cc56a0c4f44e58128f67713eaa8de73a0e4
                                            • Opcode Fuzzy Hash: 8201f168c6f6582cf072fd6925d341ece78d9b11dbfcf64f435333d10feaf4ce
                                            • Instruction Fuzzy Hash: C5C18F74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB395D85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 190ac10e8c10d684d091b028d1b35c18574cfe311dfa5656b7f23c1eab3a4113
                                            • Instruction ID: 8369f8f058fdc2d2ca3066bd2f3375fc8a359c2dadf38822616f9c793be7ce07
                                            • Opcode Fuzzy Hash: 190ac10e8c10d684d091b028d1b35c18574cfe311dfa5656b7f23c1eab3a4113
                                            • Instruction Fuzzy Hash: 93C18F74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB356E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 289579f89eeb1e80baa0a8b2019dafc478b3ea92dc2cd070b48e95a10590a3f8
                                            • Instruction ID: fcf1a70af0d7ada1a42ec62090fe2fd5fd3f4cfabb33c7fd8e37f665cc1f92ec
                                            • Opcode Fuzzy Hash: 289579f89eeb1e80baa0a8b2019dafc478b3ea92dc2cd070b48e95a10590a3f8
                                            • Instruction Fuzzy Hash: 83C19E74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D909AB394DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1c170154f6263932766fc8384270d9d411057fb0cb0b30b25e4424cb352e858c
                                            • Instruction ID: 64ba65a9873acb5e67a6708cdf90f039f09d9a37acf0de1487a383fd4a08ccc4
                                            • Opcode Fuzzy Hash: 1c170154f6263932766fc8384270d9d411057fb0cb0b30b25e4424cb352e858c
                                            • Instruction Fuzzy Hash: 54C19E74E102188FDB24DFA5D954BADBBB2FF89304F2090A9D409AB394DB395E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3da15dd48058ab57d8102669938bee04b708ec489debfe04995b5e397e439a9
                                            • Instruction ID: 991c1a928a842f881e44d57f366d921fed099aaecac8e1edd5e23ac80fb5e1d1
                                            • Opcode Fuzzy Hash: a3da15dd48058ab57d8102669938bee04b708ec489debfe04995b5e397e439a9
                                            • Instruction Fuzzy Hash: CDC18E74E10218CFDB24DFA5D994BADBBB2FB89304F2090A9D409AB394DB355E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a27d9bcd45c44b6994ef4c7e79ca77c586c5238660c1e6002b397b2cff517d07
                                            • Instruction ID: a430a8624ae14881fc314696f46a3cea7f96ac47da3fe127191175d8bea94ca6
                                            • Opcode Fuzzy Hash: a27d9bcd45c44b6994ef4c7e79ca77c586c5238660c1e6002b397b2cff517d07
                                            • Instruction Fuzzy Hash: 97C18E74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D509AB394DB395E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 803a62f53df3ff7a7fc747ad3fa3a1875e6fc69a31c992ba62c62cead3553d55
                                            • Instruction ID: 932668c544539fef29fd8a00fc7c164b9c21a481e20b0309b002cf5a00e13e7f
                                            • Opcode Fuzzy Hash: 803a62f53df3ff7a7fc747ad3fa3a1875e6fc69a31c992ba62c62cead3553d55
                                            • Instruction Fuzzy Hash: 82C18F74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB395D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 402dcc8953d76a5c1c0af59cb4d8d327770db8065e9d9582701b1d18b4a2c3d6
                                            • Instruction ID: 81359ad5cbfc559478665c9dc6a6a64ee0fa075b8efcb80d8b03667e32f7a4b4
                                            • Opcode Fuzzy Hash: 402dcc8953d76a5c1c0af59cb4d8d327770db8065e9d9582701b1d18b4a2c3d6
                                            • Instruction Fuzzy Hash: 58C18074E002188FDB24DFA5D954BADBBB2FF89304F1091A9D409AB394DB395D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a40d7618bc36f529389635211797aa77988b0d807769f4bad68e9acb01cfc8d3
                                            • Instruction ID: 11dfdf361e0c4257bf9d02e6af22a4d08f7ee0cd5508575f6d35400db78504be
                                            • Opcode Fuzzy Hash: a40d7618bc36f529389635211797aa77988b0d807769f4bad68e9acb01cfc8d3
                                            • Instruction Fuzzy Hash: 37C18E74E002188FDB24DFA5D954BADBBB2FF89304F2090A9D819AB394DB395D85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b9ed64a04dd041e260073ad4e8c1defbafdca79ed7e5621f0a4bad5e65b4c06
                                            • Instruction ID: a9f4eed03fd65c387664650141c364d5d9f615527f469443073bd30de133fa0f
                                            • Opcode Fuzzy Hash: 4b9ed64a04dd041e260073ad4e8c1defbafdca79ed7e5621f0a4bad5e65b4c06
                                            • Instruction Fuzzy Hash: 3BC19F74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D509AB394DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8072021a5f4bbd23c4b63e19ea4feaa4d26bddf4dadd81b258037e0d49b3813
                                            • Instruction ID: 041b849b41fc6157de4b3423309ccc690d8b35700509cc8d2b43f57da3b55631
                                            • Opcode Fuzzy Hash: c8072021a5f4bbd23c4b63e19ea4feaa4d26bddf4dadd81b258037e0d49b3813
                                            • Instruction Fuzzy Hash: 5AC18E74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB395E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eb176c243d155084825490bfe536d70f9681bda96ff8808dbd40b02272e89af1
                                            • Instruction ID: 9eb4ecc8092674a60557bcf57814da3a3a234051c3f26505afe6f8b00e6478c2
                                            • Opcode Fuzzy Hash: eb176c243d155084825490bfe536d70f9681bda96ff8808dbd40b02272e89af1
                                            • Instruction Fuzzy Hash: 5FC18E74E002188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB395E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ac722d27e3c0ed9d0d60ed098afd64508494dff7f74eb8e897175919076c14b
                                            • Instruction ID: 50ed89ee627184c7b551e8a1d8ec27fc0341686ed3902d36d52171d3254fd751
                                            • Opcode Fuzzy Hash: 0ac722d27e3c0ed9d0d60ed098afd64508494dff7f74eb8e897175919076c14b
                                            • Instruction Fuzzy Hash: CBC19E74E00218CFDB24DFA5D954BADBBB2FB89304F2091A9D409AB394DB395E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1561d58e46f6ffe24c935660694eded0452f05ed817d6e7c281d1430a992703d
                                            • Instruction ID: 2132204669f3e25da0fd47dcf0664932793245060ee3d90419e44774dbecc478
                                            • Opcode Fuzzy Hash: 1561d58e46f6ffe24c935660694eded0452f05ed817d6e7c281d1430a992703d
                                            • Instruction Fuzzy Hash: 25C19F74E102188FDB24DFA5D954BADBBB2FF89304F2090A9D409AB394DB355D85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f155973ae8d46c1e7996c2aecaf81a36391468c7a9e0d27098969ce270efc45b
                                            • Instruction ID: 5c18eb63415f61572e9d68ea571ab0482be74b697b3433ed186d599c3a1171fd
                                            • Opcode Fuzzy Hash: f155973ae8d46c1e7996c2aecaf81a36391468c7a9e0d27098969ce270efc45b
                                            • Instruction Fuzzy Hash: 32C19F74E102188FDB24DFA5D954BADBBB2FF89304F2091A9D409AB394DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7d6ad3f1a639cfbe10978ac8032f5dcffdb202dd561149d2d1d4d08fc4a0a50
                                            • Instruction ID: 49b271b44a25f92d2d9c2fb008e5961bcbe77a5e9ad961a84ed38ea3272d4bbe
                                            • Opcode Fuzzy Hash: e7d6ad3f1a639cfbe10978ac8032f5dcffdb202dd561149d2d1d4d08fc4a0a50
                                            • Instruction Fuzzy Hash: 52C19E74E002188FDB24DFA5D954BADBBB2FF89304F2090A9D509AB394DB395E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2692955cfe9d1427aed4ba625c51cc2689f92cc44dfeb332e96f029443f79ab5
                                            • Instruction ID: d9cd37840b19d80f6dbbd3d07cff77c7b90ff9d2358289ad2f98d046a0414e91
                                            • Opcode Fuzzy Hash: 2692955cfe9d1427aed4ba625c51cc2689f92cc44dfeb332e96f029443f79ab5
                                            • Instruction Fuzzy Hash: EDC19E74E002188FDB24DFA5D954BADBBB2FF89304F2090A9D409AB395DB395E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e13a0f41b476e12a98c2964d0ed4a2226e7f197850e9ba83f50352ff24942004
                                            • Instruction ID: 9709aa2903dc1bf505b3c9e499bdee92a7e8cb9270210d59431967cb34262097
                                            • Opcode Fuzzy Hash: e13a0f41b476e12a98c2964d0ed4a2226e7f197850e9ba83f50352ff24942004
                                            • Instruction Fuzzy Hash: 37C18074E00218CFDB24DFA5D954BADBBB2FB89304F2091A9D409AB394DB355D85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 369eeaf11a84eee29b1d6e0d9a94825f774a4e18c019cac6c478f60f79331d17
                                            • Instruction ID: 773c1e8dff3c0dadb3fa65ed4b67dd6a76ee15bdcb7a220a4149d62150119837
                                            • Opcode Fuzzy Hash: 369eeaf11a84eee29b1d6e0d9a94825f774a4e18c019cac6c478f60f79331d17
                                            • Instruction Fuzzy Hash: 7AC19F74E002188FDB24DFA5D954BADBBB2FF89305F2090A9D409AB394DB355E85CF11
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 061f2cef3a433a206e3d3708b64b315e910952ee652a1b7c25f855a31e9b83f7
                                            • Instruction ID: 784b0fef74d50bd932eb95c7aad936668bc4e31efa631f24d39659f473fc2f7a
                                            • Opcode Fuzzy Hash: 061f2cef3a433a206e3d3708b64b315e910952ee652a1b7c25f855a31e9b83f7
                                            • Instruction Fuzzy Hash: 55C19F74E012188FDB24DFA5D954BADBBB2FB89304F2090A9D409AB395DB355E85CF10
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d576262d66bade439c064439f34b5f8ed727e04f63a51f625a29c1e9f8aaa818
                                            • Instruction ID: 0e3c9843b038766c2a551e2c42b203a472c57cdaec4a45ffec3ea624a1a7901e
                                            • Opcode Fuzzy Hash: d576262d66bade439c064439f34b5f8ed727e04f63a51f625a29c1e9f8aaa818
                                            • Instruction Fuzzy Hash: 5AB1BE74E10218CFDB54DFA9D884A9DBBB2FF89314F2081A9D919AB365DB34AD41CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 30220cbd78611438c33ff65d23aee49f741e5276541948587c131754e5da0524
                                            • Instruction ID: 19ba3928e1ae5256ee093e920c75aa306480551744722fde3ae1dae8e01cde4f
                                            • Opcode Fuzzy Hash: 30220cbd78611438c33ff65d23aee49f741e5276541948587c131754e5da0524
                                            • Instruction Fuzzy Hash: F8A1AD74A05228CFDB65CF24C854BDABBB2BB4A301F1085EAD50EAB350DB359E85CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ec585c3c29d8e890692977534114dd7b44be9e1656290a62e6f655e8c5758c8
                                            • Instruction ID: 8697d57381143ccbadbb94773d827d53f35e86c8fa62f4729b4653831b6f355c
                                            • Opcode Fuzzy Hash: 9ec585c3c29d8e890692977534114dd7b44be9e1656290a62e6f655e8c5758c8
                                            • Instruction Fuzzy Hash: 2F51A374E006088FDB08CFAAD994A9DFBF2FF89310F249169D818AB365DB349841CF14
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.508631634.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_15d0000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8ed100a817a93ee3901ecf2dd6b22dc9bb7dc8a05afddf530a50f657a167afc
                                            • Instruction ID: f59ce4d08161c7f5e99f39418c5f9df35c0a63fca2a2dfc4cf935ef6b6f77be1
                                            • Opcode Fuzzy Hash: d8ed100a817a93ee3901ecf2dd6b22dc9bb7dc8a05afddf530a50f657a167afc
                                            • Instruction Fuzzy Hash: A451AE74A01228CFCB65CF24C854BEABBB2BB4A301F5095E9D80AA7354DB359E81CF50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000001.00000002.511204097.0000000005A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5a00000_P0A2249.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 403782eb2e88ab14aae79b92b40f4c58f0afc91cc20316de6219f61a69f23880
                                            • Instruction ID: ce88eb33863b4404d19c477fe836806e8630ea9e22577b9eaccdf9e234f05ab9
                                            • Opcode Fuzzy Hash: 403782eb2e88ab14aae79b92b40f4c58f0afc91cc20316de6219f61a69f23880
                                            • Instruction Fuzzy Hash: 02D09234D1825A8ACF20EFA8E9547AEF3B2BB96314F0121E6811DB7250D7309E558F46
                                            Uniqueness

                                            Uniqueness Score: -1.00%