Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
Analysis ID:756003
MD5:f64f729e0ba974c578afaac25665e067
SHA1:d1225322fd5f16eb18a90ec4a4b007a010e2d51a
SHA256:680f16527c5dc7e7e32bb27b99dcbc85c75282d853cb9a27c186963dae883d2e
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe (PID: 5644 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe MD5: F64F729E0BA974C578AFAAC25665E067)
    • powershell.exe (PID: 3216 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 3644 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • UmpBcHBDbXhaX.exe (PID: 624 cmdline: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe MD5: F64F729E0BA974C578AFAAC25665E067)
    • schtasks.exe (PID: 3540 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp8847.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • UmpBcHBDbXhaX.exe (PID: 5468 cmdline: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe MD5: F64F729E0BA974C578AFAAC25665E067)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/sendMessage?chat_id=5733364805"}
SourceRuleDescriptionAuthorStrings
00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31883:$a13: get_DnsResolver
      • 0x2ff53:$a20: get_LastAccessed
      • 0x322b1:$a27: set_InternalServerPort
      • 0x325e6:$a30: set_GuidMasterKey
      • 0x30065:$a33: get_Clipboard
      • 0x30073:$a34: get_Keyboard
      • 0x3147d:$a35: get_ShiftKeyDown
      • 0x3148e:$a36: get_AltKeyDown
      • 0x30080:$a37: get_Password
      • 0x30bd8:$a38: get_PasswordHash
      • 0x31ce5:$a39: get_DefaultCredentials
      0000000A.00000002.592547674.0000000002AF8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.592981435.0000000002BF8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x327c4:$s10: logins
              • 0x3223e:$s11: credential
              • 0x2e465:$g1: get_Clipboard
              • 0x2e473:$g2: get_Keyboard
              • 0x2e480:$g3: get_Password
              • 0x2f86d:$g4: get_CtrlKeyDown
              • 0x2f87d:$g5: get_ShiftKeyDown
              • 0x2f88e:$g6: get_AltKeyDown
              0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2fc83:$a13: get_DnsResolver
              • 0x2e353:$a20: get_LastAccessed
              • 0x306b1:$a27: set_InternalServerPort
              • 0x309e6:$a30: set_GuidMasterKey
              • 0x2e465:$a33: get_Clipboard
              • 0x2e473:$a34: get_Keyboard
              • 0x2f87d:$a35: get_ShiftKeyDown
              • 0x2f88e:$a36: get_AltKeyDown
              • 0x2e480:$a37: get_Password
              • 0x2efd8:$a38: get_PasswordHash
              • 0x300e5:$a39: get_DefaultCredentials
              6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 24 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, ParentProcessId: 5644, ParentProcessName: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp, ProcessId: 3644, ProcessName: schtasks.exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeReversingLabs: Detection: 31%
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeReversingLabs: Detection: 31%
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJoe Sandbox ML: detected
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/sendMessage?chat_id=5733364805"}
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.5340.6.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/sendMessage"}
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://SDRcFr.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.366428290.0000000001207000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/
                Source: UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/5733364805%discordapi%yyy
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.365703754.0000000000EFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2bb0724.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 5.2.UmpBcHBDbXhaX.exe.2a20620.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 5.2.UmpBcHBDbXhaX.exe.2a02e50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2b92f54.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5644, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3E12ED6Cu002dD3A3u002d460Eu002dAA91u002d617C2FC494E6u007d/D32C3C92u002d6775u002d47B3u002dB316u002d8190B687AACD.csLarge array initialization: .cctor: array initializer size 10967
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2bb0724.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 5.2.UmpBcHBDbXhaX.exe.2a20620.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 5.2.UmpBcHBDbXhaX.exe.2a02e50.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2b92f54.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5644, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 0_2_00EEC1640_2_00EEC164
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 0_2_00EEE5A20_2_00EEE5A2
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 0_2_00EEE5B00_2_00EEE5B0
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeCode function: 5_2_0121C1645_2_0121C164
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeCode function: 5_2_0121E5A15_2_0121E5A1
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeCode function: 5_2_0121E5B05_2_0121E5B0
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeCode function: 5_2_05AC0E9B5_2_05AC0E9B
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_010BFA206_2_010BFA20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_010BBB686_2_010BBB68
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D2BD986_2_05D2BD98
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D2CAE86_2_05D2CAE8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D200406_2_05D20040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D229F86_2_05D229F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D209106_2_05D20910
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F03006_2_060F0300
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F03E06_2_060F03E0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F61D86_2_060F61D8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060FAE206_2_060FAE20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F9BA46_2_060F9BA4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F72086_2_060F7208
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060F72B86_2_060F72B8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060FAD2F6_2_060FAD2F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_060FBB106_2_060FBB10
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000000.323275662.00000000007DA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDPxD.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec03bef3a-96ec-4973-ae0d-73bcad213f0f.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec03bef3a-96ec-4973-ae0d-73bcad213f0f.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.365703754.0000000000EFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.375394541.00000000073A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.589454463.0000000000CF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000000.363775300.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec03bef3a-96ec-4973-ae0d-73bcad213f0f.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeBinary or memory string: OriginalFilenameDPxD.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: UmpBcHBDbXhaX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeReversingLabs: Detection: 31%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeJump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp8847.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmpJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp8847.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4E8A.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/9@0/1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000000.323009902.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, UmpBcHBDbXhaX.exe.0.drBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000000.323009902.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, UmpBcHBDbXhaX.exe.0.drBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000000.323009902.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, UmpBcHBDbXhaX.exe.0.drBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.593323499.0000000002C40000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592905426.0000000002B40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeMutant created: \Sessions\1\BaseNamedObjects\eIuimuWJTjwFo
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1348:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5484:120:WilError_01
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000003.364514254.00000000071A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PP99Q.vBPmm8Q
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 0_2_00EEF972 pushad ; iretd 0_2_00EEF979
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeCode function: 5_2_05AC65A0 pushfd ; retf 5_2_05AC65A1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeCode function: 6_2_05D2A6CD push 8B000005h; retf 6_2_05D2A6D7
                Source: initial sampleStatic PE information: section name: .text entropy: 7.663847187465398
                Source: initial sampleStatic PE information: section name: .text entropy: 7.663847187465398
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon (7).png
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2bb0724.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.UmpBcHBDbXhaX.exe.2a20620.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.UmpBcHBDbXhaX.exe.2a02e50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.2b92f54.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.368700625.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.406721462.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 624, type: MEMORYSTR
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.368700625.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.406721462.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.368700625.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.406721462.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe TID: 5752Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe TID: 1968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5520Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe TID: 1400Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe TID: 5504Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe TID: 4840Thread sleep time: -10145709240540247s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe TID: 4808Thread sleep count: 9742 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe TID: 4116Thread sleep time: -19369081277395017s >= -30000s
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe TID: 4124Thread sleep count: 9722 > 30
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9312Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWindow / User API: threadDelayed 9742Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWindow / User API: threadDelayed 9722
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeThread delayed: delay time: 922337203685477
                Source: UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmpJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp8847.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeProcess created: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 5468, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.592547674.0000000002AF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.592981435.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 5468, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 5468, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 5468, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3e4f4c0.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3ee36e0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.3f41100.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.592547674.0000000002AF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.592981435.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5644, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe PID: 5340, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: UmpBcHBDbXhaX.exe PID: 5468, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                11
                Process Injection
                11
                Masquerading
                1
                OS Credential Dumping
                311
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                111
                Input Capture
                1
                Process Discovery
                Remote Desktop Protocol111
                Input Capture
                Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares11
                Archive Collected Data
                Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object Model1
                Data from Local System
                Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSH1
                Clipboard Data
                Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials114
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756003 Sample: SecuriteInfo.com.Win32.Cryp... Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 41 Malicious sample detected (through community Yara rule) 2->41 43 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->43 45 Sigma detected: Scheduled temp file as task from temp location 2->45 47 7 other signatures 2->47 7 SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe 7 2->7         started        11 UmpBcHBDbXhaX.exe 5 2->11         started        process3 file4 31 C:\Users\user\AppData\...\UmpBcHBDbXhaX.exe, PE32 7->31 dropped 33 C:\...\UmpBcHBDbXhaX.exe:Zone.Identifier, ASCII 7->33 dropped 35 C:\Users\user\AppData\Local\...\tmp4E8A.tmp, XML 7->35 dropped 37 SecuriteInfo.com.W...12778.11165.exe.log, ASCII 7->37 dropped 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->51 53 Uses schtasks.exe or at.exe to add and modify task schedules 7->53 55 Adds a directory exclusion to Windows Defender 7->55 13 SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe 2 7->13         started        17 powershell.exe 21 7->17         started        19 schtasks.exe 1 7->19         started        57 Multi AV Scanner detection for dropped file 11->57 59 Machine Learning detection for dropped file 11->59 21 UmpBcHBDbXhaX.exe 2 11->21         started        23 schtasks.exe 1 11->23         started        signatures5 process6 dnsIp7 39 192.168.2.1 unknown unknown 13->39 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        61 Tries to steal Mail credentials (via file / registry access) 21->61 63 Tries to harvest and steal browser information (history, passwords, etc) 21->63 65 Installs a global keyboard hook 21->65 29 conhost.exe 23->29         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe32%ReversingLabsWin32.Trojan.Woreflint
                SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe32%ReversingLabsWin32.Trojan.Woreflint
                SourceDetectionScannerLabelLinkDownload
                6.0.SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.fontbureau.comF0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://SDRcFr.com0%Avira URL Cloudsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comFSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.366428290.0000000001207000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/5733364805%discordapi%yyyUmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.carterandcone.comlSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://DynDns.comDynDNSnamejidpasswordPsi/PsiUmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, UmpBcHBDbXhaX.exe, 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sakkal.comSecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe, 00000000.00000002.373712902.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://SDRcFr.comUmpBcHBDbXhaX.exe, 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          IP
                                          192.168.2.1
                                          Joe Sandbox Version:36.0.0 Rainbow Opal
                                          Analysis ID:756003
                                          Start date and time:2022-11-29 13:49:14 +01:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 35s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:16
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@15/9@0/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 97%
                                          • Number of executed functions: 115
                                          • Number of non-executed functions: 4
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          13:50:24API Interceptor591x Sleep call for process: SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe modified
                                          13:50:30API Interceptor19x Sleep call for process: powershell.exe modified
                                          13:50:32Task SchedulerRun new task: UmpBcHBDbXhaX path: C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          13:50:39API Interceptor467x Sleep call for process: UmpBcHBDbXhaX.exe modified
                                          No context
                                          No context
                                          No context
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):21876
                                          Entropy (8bit):5.601829389408276
                                          Encrypted:false
                                          SSDEEP:384:3tCRdN02OVJ/cVCyYnP0SBxniju57iJ9gvRSJ3uyO1+m0S1AVrdtGuA+inYQ:r/cG84xiS57JcuG7lQ
                                          MD5:2E9B889A60208A20362A3E53763B6013
                                          SHA1:7F1F939BC9A458DEE7D453964AEBF1D7FAFAA80C
                                          SHA-256:BFDABCA0F512BD8D3E9CB576755745431D206F0A62227CB17F878E7941D02AB2
                                          SHA-512:A17F20FF83AF7CBF72DD1796377E0A251E61A06BF4A3AD258694BDBCCD231BCC5A2C5B61D4DCE7F8444D967F26F739D19E8C8701F31021B692EB9AEA753F0379
                                          Malicious:false
                                          Preview:@...e...............................:.B..............@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.148849411848415
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaZJxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTW/v
                                          MD5:82365BDA4E63EF625F4390CA5F4CF939
                                          SHA1:C08BB866E48BEC9B106EE09266328F367FF663C3
                                          SHA-256:089F94C9BFBD16049A4B211D130CE625DFD4C2761C988E08CE58712C1DC9A6BC
                                          SHA-512:E3017A4E3E3A66F46488418531719D3B10D2D838D9E81BFDCAF9F8A83B3B483D5361D869C1BDAA2C9E1541F2B16F94C4EC573CD3A94E1AA3A4EBA40ECD753186
                                          Malicious:true
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                          Process:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.148849411848415
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaZJxvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTW/v
                                          MD5:82365BDA4E63EF625F4390CA5F4CF939
                                          SHA1:C08BB866E48BEC9B106EE09266328F367FF663C3
                                          SHA-256:089F94C9BFBD16049A4B211D130CE625DFD4C2761C988E08CE58712C1DC9A6BC
                                          SHA-512:E3017A4E3E3A66F46488418531719D3B10D2D838D9E81BFDCAF9F8A83B3B483D5361D869C1BDAA2C9E1541F2B16F94C4EC573CD3A94E1AA3A4EBA40ECD753186
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):951296
                                          Entropy (8bit):7.6550716384576925
                                          Encrypted:false
                                          SSDEEP:12288:kBuqU+PCH5W8IgKprPRibKTh6SoqZpK3tUjjAK7nYbSuSmFbWNHrDdzoa1cfN:Idrlf6SoqbK3InYUJDdEPf
                                          MD5:F64F729E0BA974C578AFAAC25665E067
                                          SHA1:D1225322FD5F16EB18A90EC4A4B007A010E2D51A
                                          SHA-256:680F16527C5DC7E7E32BB27B99DCBC85C75282D853CB9A27C186963DAE883D2E
                                          SHA-512:6BF0F4A2567736CDFA5E422E23F1F43A593699A1276654264A619E2F1B4690AF911E04508D0928C3A84EA658C022DC4B44F4F0467254C72BB92191E212E029C8
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 32%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..c..............0..j............... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text....j... ...j.................. ..`.rsrc................l..............@..@.reloc..............................@..B.......................H.......<...........l...8u..p...........................................^..}.....(.......(.....*.0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0..+.........,..{.......+....,...{....o........(.....*..0..r.............(....s......s....}.....s....}.....s....}.....s....}.....(......{....(....o......{.....o......{.....o .....{....r...p"..@A...s!...o".....{....(#...o$.....{.... .... ..
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.6550716384576925
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          File size:951296
                                          MD5:f64f729e0ba974c578afaac25665e067
                                          SHA1:d1225322fd5f16eb18a90ec4a4b007a010e2d51a
                                          SHA256:680f16527c5dc7e7e32bb27b99dcbc85c75282d853cb9a27c186963dae883d2e
                                          SHA512:6bf0f4a2567736cdfa5e422e23f1f43a593699a1276654264a619e2f1b4690af911e04508d0928c3a84ea658c022dc4b44f4f0467254c72bb92191e212e029c8
                                          SSDEEP:12288:kBuqU+PCH5W8IgKprPRibKTh6SoqZpK3tUjjAK7nYbSuSmFbWNHrDdzoa1cfN:Idrlf6SoqbK3InYUJDdEPf
                                          TLSH:FC15D08023A6AF70F5386BF37521904827763C6E94F1D2296DDDB0DE2A76B5049F0B27
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..c..............0..j............... ........@.. ....................................@................................
                                          Icon Hash:63e6a3a1a6bdbdbb
                                          Entrypoint:0x4e89fa
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6385A66A [Tue Nov 29 06:27:54 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe89a80x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x14d0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xe6a000xe6a00False0.8274824271680217data7.663847187465398IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xea0000x14d00x1600False0.5793678977272727data5.573635871144453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xec0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xea0e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                                          RT_GROUP_ICON0xeb1900x14data
                                          RT_VERSION0xeb1a40x32cdata
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          No network behavior found

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:13:50:16
                                          Start date:29/11/2022
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          Imagebase:0x6f0000
                                          File size:951296 bytes
                                          MD5 hash:F64F729E0BA974C578AFAAC25665E067
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.368700625.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.370626906.0000000003E1E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.367157703.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:1
                                          Start time:13:50:27
                                          Start date:29/11/2022
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          Imagebase:0xd00000
                                          File size:430592 bytes
                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          Target ID:2
                                          Start time:13:50:27
                                          Start date:29/11/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7c72c0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:3
                                          Start time:13:50:28
                                          Start date:29/11/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp4E8A.tmp
                                          Imagebase:0xcb0000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:4
                                          Start time:13:50:28
                                          Start date:29/11/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7c72c0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:5
                                          Start time:13:50:34
                                          Start date:29/11/2022
                                          Path:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          Imagebase:0x690000
                                          File size:951296 bytes
                                          MD5 hash:F64F729E0BA974C578AFAAC25665E067
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.406721462.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.405119003.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 32%, ReversingLabs
                                          Reputation:low

                                          Target ID:6
                                          Start time:13:50:35
                                          Start date:29/11/2022
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12778.11165.exe
                                          Imagebase:0x7b0000
                                          File size:951296 bytes
                                          MD5 hash:F64F729E0BA974C578AFAAC25665E067
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.363415114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.592981435.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.592124173.0000000002B51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:8
                                          Start time:13:50:46
                                          Start date:29/11/2022
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmpBcHBDbXhaX" /XML "C:\Users\user\AppData\Local\Temp\tmp8847.tmp
                                          Imagebase:0xcb0000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:9
                                          Start time:13:50:46
                                          Start date:29/11/2022
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7c72c0000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:10
                                          Start time:13:50:48
                                          Start date:29/11/2022
                                          Path:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\UmpBcHBDbXhaX.exe
                                          Imagebase:0x740000
                                          File size:951296 bytes
                                          MD5 hash:F64F729E0BA974C578AFAAC25665E067
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.592547674.0000000002AF8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.592099137.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:10.8%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:111
                                            Total number of Limit Nodes:8
                                            execution_graph 14193 eeb8f8 DuplicateHandle 14194 eeb98e 14193->14194 14195 eefd38 14196 eefda0 CreateWindowExW 14195->14196 14198 eefe5c 14196->14198 14199 ee40d0 14200 ee40e2 14199->14200 14201 ee40ee 14200->14201 14206 ee41e0 14200->14206 14211 ee4121 14200->14211 14216 ee3c64 14201->14216 14203 ee410d 14207 ee4205 14206->14207 14220 ee42e0 14207->14220 14224 ee42d1 14207->14224 14213 ee412a 14211->14213 14212 ee420f 14212->14201 14214 ee42e0 CreateActCtxA 14213->14214 14215 ee42d1 CreateActCtxA 14213->14215 14214->14212 14215->14212 14217 ee3c6f 14216->14217 14232 ee51a4 14217->14232 14219 ee6a50 14219->14203 14222 ee4307 14220->14222 14221 ee43e4 14221->14221 14222->14221 14228 ee3de4 14222->14228 14226 ee42e0 14224->14226 14225 ee43e4 14225->14225 14226->14225 14227 ee3de4 CreateActCtxA 14226->14227 14227->14225 14229 ee5370 CreateActCtxA 14228->14229 14231 ee5433 14229->14231 14233 ee51af 14232->14233 14236 ee57f8 14233->14236 14235 ee6af5 14235->14219 14237 ee5803 14236->14237 14240 ee5828 14237->14240 14239 ee6bda 14239->14235 14241 ee5833 14240->14241 14244 ee5858 14241->14244 14243 ee6cca 14243->14239 14245 ee5863 14244->14245 14247 ee73de 14245->14247 14250 ee9198 14245->14250 14246 ee741c 14246->14243 14247->14246 14254 eeb2f0 14247->14254 14259 ee91c2 14250->14259 14263 ee91d0 14250->14263 14251 ee91ae 14251->14247 14255 eeb321 14254->14255 14256 eeb345 14255->14256 14289 eeb5b8 14255->14289 14293 eeb5a9 14255->14293 14256->14246 14260 ee91d0 14259->14260 14266 ee92c8 14260->14266 14261 ee91df 14261->14251 14265 ee92c8 LoadLibraryExW 14263->14265 14264 ee91df 14264->14251 14265->14264 14267 ee92db 14266->14267 14268 ee92eb 14267->14268 14272 ee99ac 14267->14272 14277 ee9958 14267->14277 14281 ee9948 14267->14281 14268->14261 14273 ee99b7 14272->14273 14274 ee996c 14272->14274 14276 ee9991 14274->14276 14285 ee94b8 14274->14285 14276->14268 14278 ee996c 14277->14278 14279 ee9991 14278->14279 14280 ee94b8 LoadLibraryExW 14278->14280 14279->14268 14280->14279 14282 ee9958 14281->14282 14283 ee94b8 LoadLibraryExW 14282->14283 14284 ee9991 14282->14284 14283->14284 14284->14268 14286 ee9b38 LoadLibraryExW 14285->14286 14288 ee9bb1 14286->14288 14288->14276 14290 eeb5c5 14289->14290 14291 eeb5ff 14290->14291 14298 ee97b8 14290->14298 14291->14256 14294 eeb525 14293->14294 14295 eeb5b2 14293->14295 14296 eeb5ff 14295->14296 14297 ee97b8 LoadLibraryExW 14295->14297 14296->14256 14297->14296 14299 ee97c3 14298->14299 14301 eec2f8 14299->14301 14302 ee9880 14299->14302 14303 ee988b 14302->14303 14304 ee5858 LoadLibraryExW 14303->14304 14305 eec367 14304->14305 14306 eec375 14305->14306 14310 eec3d0 14305->14310 14315 eee0e8 14306->14315 14307 eec3a0 14307->14301 14311 eec383 14310->14311 14313 eec3d6 14310->14313 14314 eee0e8 LoadLibraryExW 14311->14314 14312 eec3a0 14312->14306 14314->14312 14317 eee119 14315->14317 14318 eee165 14315->14318 14316 eee125 14316->14307 14317->14316 14319 eee568 LoadLibraryExW 14317->14319 14320 eee558 LoadLibraryExW 14317->14320 14318->14307 14319->14318 14320->14318 14321 eeb6d0 GetCurrentProcess 14322 eeb74a GetCurrentThread 14321->14322 14323 eeb743 14321->14323 14324 eeb787 GetCurrentProcess 14322->14324 14325 eeb780 14322->14325 14323->14322 14328 eeb7bd 14324->14328 14325->14324 14326 eeb7e5 GetCurrentThreadId 14327 eeb816 14326->14327 14328->14326 14329 ee98b0 14330 ee98f8 GetModuleHandleW 14329->14330 14331 ee98f2 14329->14331 14332 ee9925 14330->14332 14331->14330

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 00EEB730
                                            • GetCurrentThread.KERNEL32 ref: 00EEB76D
                                            • GetCurrentProcess.KERNEL32 ref: 00EEB7AA
                                            • GetCurrentThreadId.KERNEL32 ref: 00EEB803
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: dbe48d4c0398d4459ea3f709f727bbbba26db30ca023b62e197c69aa57538c40
                                            • Instruction ID: eea09bd2bf9f1ec0ed054d85d0bc588ef991ed5c293179e8e3204bda5150411d
                                            • Opcode Fuzzy Hash: dbe48d4c0398d4459ea3f709f727bbbba26db30ca023b62e197c69aa57538c40
                                            • Instruction Fuzzy Hash: C95156B0D007498FDB10DFAAD548B9EBBF2AF88314F20855AE419B7251D7746884CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 00EEB730
                                            • GetCurrentThread.KERNEL32 ref: 00EEB76D
                                            • GetCurrentProcess.KERNEL32 ref: 00EEB7AA
                                            • GetCurrentThreadId.KERNEL32 ref: 00EEB803
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 67d1596b270be3344c968d3d7df88b5f0e403eed3f5d589c22b2fafdd13f1e52
                                            • Instruction ID: 81600c27ba3bcee6ef52ff33301ff469d607bb01ead468b3fcc6de3616653c6e
                                            • Opcode Fuzzy Hash: 67d1596b270be3344c968d3d7df88b5f0e403eed3f5d589c22b2fafdd13f1e52
                                            • Instruction Fuzzy Hash: 035164B0D00649CFDB10CFAAD588B9EBBF2AF88308F20855AE419B7350D7746884CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 39 eefd2c-eefd9e 40 eefda9-eefdb0 39->40 41 eefda0-eefda6 39->41 42 eefdbb-eefdf3 40->42 43 eefdb2-eefdb8 40->43 41->40 44 eefdfb-eefe5a CreateWindowExW 42->44 43->42 45 eefe5c-eefe62 44->45 46 eefe63-eefe9b 44->46 45->46 50 eefe9d-eefea0 46->50 51 eefea8 46->51 50->51 52 eefea9 51->52 52->52
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EEFE4A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: aa7a7f3a94d64d8f9889b6b046af836bdf99aee86578d4b1f3e11c440df7e202
                                            • Instruction ID: 0075e71f0bc568e85c0e73dd4825c4df7907fa384b94b37d7fc3a432d2a4b411
                                            • Opcode Fuzzy Hash: aa7a7f3a94d64d8f9889b6b046af836bdf99aee86578d4b1f3e11c440df7e202
                                            • Instruction Fuzzy Hash: E151B1B1D103499FDB14CF9AD884ADEBBB1BF88314F24812AE419AB211D775A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 53 eefd38-eefd9e 54 eefda9-eefdb0 53->54 55 eefda0-eefda6 53->55 56 eefdbb-eefe5a CreateWindowExW 54->56 57 eefdb2-eefdb8 54->57 55->54 59 eefe5c-eefe62 56->59 60 eefe63-eefe9b 56->60 57->56 59->60 64 eefe9d-eefea0 60->64 65 eefea8 60->65 64->65 66 eefea9 65->66 66->66
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00EEFE4A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 4091f286b1d6636e2517cc458783e57eedf898096de7aa90962b7358b220c111
                                            • Instruction ID: 20a20855e0794a0fd8ad7e14eb846f8e1a0d4037c5d09fe83ef681c181d76578
                                            • Opcode Fuzzy Hash: 4091f286b1d6636e2517cc458783e57eedf898096de7aa90962b7358b220c111
                                            • Instruction Fuzzy Hash: A841C0B1D10349DFDF14CF9AD884ADEBBB5BF88314F24812AE419AB211D774A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 67 ee5364-ee5431 CreateActCtxA 69 ee543a-ee5494 67->69 70 ee5433-ee5439 67->70 77 ee5496-ee5499 69->77 78 ee54a3-ee54a7 69->78 70->69 77->78 79 ee54b8 78->79 80 ee54a9-ee54b5 78->80 82 ee54b9 79->82 80->79 82->82
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00EE5421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 9c3e3d46e66971cef640a9bdf21e6b4f978033c9943e8047533c660688033949
                                            • Instruction ID: 009d9ca03d3f03024abd83fede94e10cc57c06f1f0db8bec295f9c34e44fc8ac
                                            • Opcode Fuzzy Hash: 9c3e3d46e66971cef640a9bdf21e6b4f978033c9943e8047533c660688033949
                                            • Instruction Fuzzy Hash: D441F271C00659CADB24CFA6C8447DEBBB5BF88308F10815AD419BB251DB756986CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 83 ee3de4-ee5431 CreateActCtxA 86 ee543a-ee5494 83->86 87 ee5433-ee5439 83->87 94 ee5496-ee5499 86->94 95 ee54a3-ee54a7 86->95 87->86 94->95 96 ee54b8 95->96 97 ee54a9-ee54b5 95->97 99 ee54b9 96->99 97->96 99->99
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00EE5421
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: f4502da6fdbe278644a3cb160ec7f2177b01a5f577b5c8728a85a8587d92290f
                                            • Instruction ID: 330f17acbf508f276b32601158770b9b3be7ff5f6bbab0d5d529da1ab323d9ce
                                            • Opcode Fuzzy Hash: f4502da6fdbe278644a3cb160ec7f2177b01a5f577b5c8728a85a8587d92290f
                                            • Instruction Fuzzy Hash: AE410271C0065CCBDB24CFAAC84479EBBB5BF48308F50815AD419BB251DBB56985CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 100 eeb8f2-eeb8f5 101 eeb8f8-eeb98c DuplicateHandle 100->101 102 eeb98e-eeb994 101->102 103 eeb995-eeb9b2 101->103 102->103
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EEB97F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 1a609390e4c5ba417cf0120826f0845bea1a62e924ef0f983d2d4cc8730506f9
                                            • Instruction ID: 2c74549fbe586cb95a638b7d00029984d75fbe715814d4fbdef2ff21eef7f755
                                            • Opcode Fuzzy Hash: 1a609390e4c5ba417cf0120826f0845bea1a62e924ef0f983d2d4cc8730506f9
                                            • Instruction Fuzzy Hash: 5821E3B59002489FDB10CF9AD884ADEBBF9EB48324F14801AE958B7310D375A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 106 eeb8f8-eeb98c DuplicateHandle 107 eeb98e-eeb994 106->107 108 eeb995-eeb9b2 106->108 107->108
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EEB97F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 604c46ff60e3e02bce6bde4a1176290538996df9f60154f1083dbb264457bcce
                                            • Instruction ID: 144894b85fd4e780096b9a6088604688ae70daeaeb4d89387490388ed528fc19
                                            • Opcode Fuzzy Hash: 604c46ff60e3e02bce6bde4a1176290538996df9f60154f1083dbb264457bcce
                                            • Instruction Fuzzy Hash: A721C2B5D002589FDB10CFAAD884ADEFBF9EB48324F14841AE918B7310D375A954CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 111 ee9b30-ee9b78 113 ee9b7a-ee9b7d 111->113 114 ee9b80-ee9baf LoadLibraryExW 111->114 113->114 115 ee9bb8-ee9bd5 114->115 116 ee9bb1-ee9bb7 114->116 116->115
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EE9991,00000800,00000000,00000000), ref: 00EE9BA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: fc4e0f7a9c6f09e39c83ae038a74d69c26a10d0d5705f65d1df02b491fce8724
                                            • Instruction ID: cea7089bb0ee298c547dac2372294d173b39f069cb351c045da7e4384f43d39b
                                            • Opcode Fuzzy Hash: fc4e0f7a9c6f09e39c83ae038a74d69c26a10d0d5705f65d1df02b491fce8724
                                            • Instruction Fuzzy Hash: 601100B6D002488FCB10DF9AD448BDEFBF5EB88324F00842AD859BB200C375A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 119 ee94b8-ee9b78 121 ee9b7a-ee9b7d 119->121 122 ee9b80-ee9baf LoadLibraryExW 119->122 121->122 123 ee9bb8-ee9bd5 122->123 124 ee9bb1-ee9bb7 122->124 124->123
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EE9991,00000800,00000000,00000000), ref: 00EE9BA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: fb502790b81c0350c42a46c32390bc1e9702fafd4a5c529bcf4bd56b49b092c4
                                            • Instruction ID: 60bcb7ab4c3853fc25a658497b2f46a79a8b940aa51ecf8519534495075976ad
                                            • Opcode Fuzzy Hash: fb502790b81c0350c42a46c32390bc1e9702fafd4a5c529bcf4bd56b49b092c4
                                            • Instruction Fuzzy Hash: 0D1114B2D002488FCB10CF9AD444BDEFBF5EB88324F14842AD819B7200C3B5A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 127 ee98b0-ee98f0 128 ee98f8-ee9923 GetModuleHandleW 127->128 129 ee98f2-ee98f5 127->129 130 ee992c-ee9940 128->130 131 ee9925-ee992b 128->131 129->128 131->130
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00EE9916
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 1da6b3bcf34b3cb3707b25f8c2be31bb696f783e950bf6ec97108937d294e124
                                            • Instruction ID: e60a429f13bf12fd399f53d1d0b1bd09222a5a06ec7c0ffbe1a0720abc06d231
                                            • Opcode Fuzzy Hash: 1da6b3bcf34b3cb3707b25f8c2be31bb696f783e950bf6ec97108937d294e124
                                            • Instruction Fuzzy Hash: 881110B1D006498FCB10DF9AD444BDEFBF5EB89324F10841AD429B7201C379A545CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365450251.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e8d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2e120351ae1d69376326af2480e564f31a5ccb07f8719750b7bb0a589f71d41
                                            • Instruction ID: d11c5cb3fff8129611164b5d9f1dc87ddcd46931f3a612da1e55754ecff2ed9e
                                            • Opcode Fuzzy Hash: c2e120351ae1d69376326af2480e564f31a5ccb07f8719750b7bb0a589f71d41
                                            • Instruction Fuzzy Hash: B12106B1508240DFDB15EF10DDC0F26BB65FB88328F24856AE90D6B286C336D856C7A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365491836.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e9d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d165e399e8e5515e18b778e6e17f769b2065d10ea0a6eddc4ede60037deda5f
                                            • Instruction ID: b7027fa7d8d39a00c801095f4eebb723b0dc08fc8a43ff048df74bd808b33046
                                            • Opcode Fuzzy Hash: 6d165e399e8e5515e18b778e6e17f769b2065d10ea0a6eddc4ede60037deda5f
                                            • Instruction Fuzzy Hash: 6421B375508340DFDF14DF14D9C4B26BB66FB88318F24C969D9495B246C33AD846CA62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365491836.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e9d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6632bea028ac5442025b87f454d160db14a151cadf049c6e9cd2c07f158cb43
                                            • Instruction ID: 824892dc7a368a7ad3b7c987f6d905d1a39f89e651f4addcefa72497363bace6
                                            • Opcode Fuzzy Hash: b6632bea028ac5442025b87f454d160db14a151cadf049c6e9cd2c07f158cb43
                                            • Instruction Fuzzy Hash: 6C2107B1508340EFDF05DF50DDC4B66BBA5FB88318F24C969E9095B256C336D846CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365491836.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e9d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b29b87e9db460512c7377330a7c6b61f174f034a8369886c55b237c651a242e4
                                            • Instruction ID: 3dbc07e5d251f8e8aa254494f7ee862f81eca4756e0f13aa1bacfbd7a17bf942
                                            • Opcode Fuzzy Hash: b29b87e9db460512c7377330a7c6b61f174f034a8369886c55b237c651a242e4
                                            • Instruction Fuzzy Hash: 4721927550D3C08FDB12CF24D994715BF71EB46314F28C5EAD8498B697C33A984ACB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365450251.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e8d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 550b37b6964cef88e04bf56cf3ed8c93bbb64104914b8e9b4460ec88b1e882bf
                                            • Instruction ID: b7ad08bce86aba6e6157fa681153cffbbd46c17d80e1c2fa1c86996c6c39a133
                                            • Opcode Fuzzy Hash: 550b37b6964cef88e04bf56cf3ed8c93bbb64104914b8e9b4460ec88b1e882bf
                                            • Instruction Fuzzy Hash: C311E676404280DFDF11DF10D9C4B16BF71FB84328F24C6AAD8495B656C336D856CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365491836.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e9d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 468a72cb4856f06587c9b45c1d269c741de08ada7c9987b899fda78c1d2ca129
                                            • Instruction ID: e8d8e0ccc32cd400c6579efab265595c5274b2610658c9b9c1aae7752e164c75
                                            • Opcode Fuzzy Hash: 468a72cb4856f06587c9b45c1d269c741de08ada7c9987b899fda78c1d2ca129
                                            • Instruction Fuzzy Hash: 7411BB75908280DFDF11CF10C9C4B15BBB1FB84328F28C6A9D8495B6A6C33AD85ACB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365450251.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e8d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3299d4fb04e618fb45048fd75b794b4d28db3b0b43c7f85142dd78bba16aa39c
                                            • Instruction ID: 6af4262f70040b4f417616d54d762b6273aef7b310b4d3bef4bad5c62016cd71
                                            • Opcode Fuzzy Hash: 3299d4fb04e618fb45048fd75b794b4d28db3b0b43c7f85142dd78bba16aa39c
                                            • Instruction Fuzzy Hash: 5501F77110C3849AE7106E66CC84BA6BBA8DF45378F18851BEA0C6B286C37A9844C7B1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365450251.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_e8d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e488dba1ff4c2ccb0b5a455a18b522f977baa2590f3892caa2fe778ca09c2718
                                            • Instruction ID: 7399c6b3072e09920f00caada888fdefea4e947046ae8c3cfbab775024aad51f
                                            • Opcode Fuzzy Hash: e488dba1ff4c2ccb0b5a455a18b522f977baa2590f3892caa2fe778ca09c2718
                                            • Instruction Fuzzy Hash: FCF062715083949AE7109E16DC88B66FBA8EB45778F18C45BED0C5B286C3799844CBB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85650a32202cf4a0c303370d4656037ca90aac9d35ad0bb856876b33bd70549f
                                            • Instruction ID: e0203823bf5003264bfa8b3d5162011cb1c8697bcd27cc37a261f60d3190837e
                                            • Opcode Fuzzy Hash: 85650a32202cf4a0c303370d4656037ca90aac9d35ad0bb856876b33bd70549f
                                            • Instruction Fuzzy Hash: 4B12D8F94117468BD3B8CF65E9981893B63F745B28FA04328D2712BAD9D7B811CACF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 921aff4dc89fe0fb643852590347b8aa8c34106150d2526a6d7e92eda9646e79
                                            • Instruction ID: eb84b09c2e716f3d8ba76d5940d4562fda0d7552b29ec012ac6df98ee1d86e6b
                                            • Opcode Fuzzy Hash: 921aff4dc89fe0fb643852590347b8aa8c34106150d2526a6d7e92eda9646e79
                                            • Instruction Fuzzy Hash: 2CA19036E006598FCF19DFA6C8445DEB7F2FF88304B25856AE905BB261EB31E945CB40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.365648585.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f052ae0d19a04e6bdfd7728dc383df9834d00c5fbc7b792f9126216fb03334a9
                                            • Instruction ID: d56d2bd2558a0c848a427aa1601a4d8735f207283fcb9e9241178698cb703aa4
                                            • Opcode Fuzzy Hash: f052ae0d19a04e6bdfd7728dc383df9834d00c5fbc7b792f9126216fb03334a9
                                            • Instruction Fuzzy Hash: A3C14DB94117458BD7A8CF64E8981897B73FB85B28F604328D2712FAD9D7B410CACF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:12.2%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:121
                                            Total number of Limit Nodes:10
                                            execution_graph 15848 12140d0 15849 12140e2 15848->15849 15850 12140ee 15849->15850 15854 12141e0 15849->15854 15859 1213c64 15850->15859 15852 121410d 15855 1214205 15854->15855 15863 12142d1 15855->15863 15867 12142e0 15855->15867 15860 1213c6f 15859->15860 15875 12151a4 15860->15875 15862 1216a50 15862->15852 15864 1214307 15863->15864 15865 12143e4 15864->15865 15871 1213de4 15864->15871 15865->15865 15868 1214307 15867->15868 15869 12143e4 15868->15869 15870 1213de4 CreateActCtxA 15868->15870 15870->15869 15872 1215370 CreateActCtxA 15871->15872 15874 1215433 15872->15874 15874->15874 15876 12151af 15875->15876 15879 12157f8 15876->15879 15878 1216af5 15878->15862 15880 1215803 15879->15880 15883 1215828 15880->15883 15882 1216bda 15882->15878 15884 1215833 15883->15884 15887 1215858 15884->15887 15886 1216cca 15886->15882 15889 1215863 15887->15889 15888 121741c 15888->15886 15889->15888 15892 121b300 15889->15892 15897 121b2f0 15889->15897 15894 121b321 15892->15894 15893 121b345 15893->15888 15894->15893 15902 121b5a9 15894->15902 15907 121b5b8 15894->15907 15898 121b321 15897->15898 15899 121b345 15898->15899 15900 121b5a9 3 API calls 15898->15900 15901 121b5b8 3 API calls 15898->15901 15899->15888 15900->15899 15901->15899 15903 121b525 15902->15903 15905 121b5b2 15902->15905 15904 121b5ff 15904->15893 15905->15904 15911 12197b8 15905->15911 15909 121b5c5 15907->15909 15908 121b5ff 15908->15893 15909->15908 15910 12197b8 3 API calls 15909->15910 15910->15908 15912 12197c3 15911->15912 15914 121c2f8 15912->15914 15915 1219880 15912->15915 15914->15914 15916 121988b 15915->15916 15917 1215858 3 API calls 15916->15917 15918 121c367 15916->15918 15917->15918 15922 121e0e8 15918->15922 15931 121e0d8 15918->15931 15919 121c3a0 15919->15914 15924 121e119 15922->15924 15926 121e20a 15922->15926 15923 121e125 15923->15919 15924->15923 15929 121e568 GetModuleHandleW LoadLibraryExW 15924->15929 15930 121e558 GetModuleHandleW LoadLibraryExW 15924->15930 15925 121e165 15927 121ef30 GetModuleHandleW CreateWindowExW 15925->15927 15928 121ef1f GetModuleHandleW CreateWindowExW 15925->15928 15926->15919 15927->15926 15928->15926 15929->15925 15930->15925 15933 121e119 15931->15933 15934 121e20a 15931->15934 15932 121e125 15932->15919 15933->15932 15938 121e568 GetModuleHandleW LoadLibraryExW 15933->15938 15939 121e558 GetModuleHandleW LoadLibraryExW 15933->15939 15934->15919 15935 121e165 15936 121ef30 GetModuleHandleW CreateWindowExW 15935->15936 15937 121ef1f GetModuleHandleW CreateWindowExW 15935->15937 15936->15934 15937->15934 15938->15935 15939->15935 15940 121b6d0 15941 121b736 15940->15941 15945 121b880 15941->15945 15948 121b890 15941->15948 15942 121b7e5 15951 1219840 15945->15951 15949 121b8be 15948->15949 15950 1219840 DuplicateHandle 15948->15950 15949->15942 15950->15949 15952 121b8f8 DuplicateHandle 15951->15952 15953 121b8be 15952->15953 15953->15942 15954 12191d0 15955 12191df 15954->15955 15958 12192b8 15954->15958 15964 12192c8 15954->15964 15970 1218240 15958->15970 15961 12192eb 15961->15955 15965 12192db 15964->15965 15966 1218240 GetModuleHandleW 15964->15966 15967 12192eb 15965->15967 15968 1219948 2 API calls 15965->15968 15969 1219958 2 API calls 15965->15969 15966->15965 15967->15955 15968->15967 15969->15967 15971 12198b0 GetModuleHandleW 15970->15971 15973 12192db 15971->15973 15973->15961 15974 1219958 15973->15974 15979 1219948 15973->15979 15975 121996c 15974->15975 15976 1218240 GetModuleHandleW 15974->15976 15978 1219991 15975->15978 15984 12194b8 15975->15984 15976->15975 15978->15961 15980 1218240 GetModuleHandleW 15979->15980 15981 121996c 15980->15981 15982 1219991 15981->15982 15983 12194b8 LoadLibraryExW 15981->15983 15982->15961 15983->15982 15985 1219b38 LoadLibraryExW 15984->15985 15987 1219bb1 15985->15987 15987->15978 15837 5ac9be8 15838 5ac9c10 15837->15838 15839 5ac9c06 15837->15839 15841 5ac9c50 15839->15841 15842 5ac9c5e 15841->15842 15844 5ac9c7d 15841->15844 15846 5ac9dc8 FindCloseChangeNotification 15842->15846 15844->15838 15847 5ac9c79 15846->15847 15847->15838 15988 5ac9158 15989 5ac92e3 15988->15989 15990 5ac917e 15988->15990 15990->15989 15992 5ac93d8 PostMessageW 15990->15992 15993 5ac9444 15992->15993 15993->15990

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 121fd2c-121fd9e 1 121fda0-121fda6 0->1 2 121fda9-121fdb0 0->2 1->2 3 121fdb2-121fdb8 2->3 4 121fdbb-121fdf3 2->4 3->4 5 121fdfb-121fe5a CreateWindowExW 4->5 6 121fe63-121fe9b 5->6 7 121fe5c-121fe62 5->7 11 121fea8 6->11 12 121fe9d-121fea0 6->12 7->6 13 121fea9 11->13 12->11 13->13
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0121FE4A
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 0ecfd19880944e77924fd327270147b487561ab63509e8b1b7789160ba8773f8
                                            • Instruction ID: 1e8aa8ffcf6e0f4456d3af71145707dbfe8c943740e78736d7f3fafb842ae4f4
                                            • Opcode Fuzzy Hash: 0ecfd19880944e77924fd327270147b487561ab63509e8b1b7789160ba8773f8
                                            • Instruction Fuzzy Hash: B151C0B1D102099FDF14CFA9C980ADEBBB1BF48314F64812AE819AB215D7749846CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 14 121de0c-121fd9e 16 121fda0-121fda6 14->16 17 121fda9-121fdb0 14->17 16->17 18 121fdb2-121fdb8 17->18 19 121fdbb-121fe5a CreateWindowExW 17->19 18->19 21 121fe63-121fe9b 19->21 22 121fe5c-121fe62 19->22 26 121fea8 21->26 27 121fe9d-121fea0 21->27 22->21 28 121fea9 26->28 27->26 28->28
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0121FE4A
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: e0e4ec5146f8fbce98eecccbdfb3ba91b34b290cc505ce8d830db73de696badd
                                            • Instruction ID: 7dfb042570115ae86e772e1940d41a135fcd3164c2fc328e15f81df4498a987a
                                            • Opcode Fuzzy Hash: e0e4ec5146f8fbce98eecccbdfb3ba91b34b290cc505ce8d830db73de696badd
                                            • Instruction Fuzzy Hash: D851EFB1D10309DFDB14CF99C984ADEBBF1BF58314F24812AE919AB214D774A885CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 29 1215364-1215431 CreateActCtxA 31 1215433-1215439 29->31 32 121543a-1215494 29->32 31->32 39 12154a3-12154a7 32->39 40 1215496-1215499 32->40 41 12154a9-12154b5 39->41 42 12154b8 39->42 40->39 41->42 44 12154b9 42->44 44->44
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01215421
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 8c3b320d994da995ba90cd8df03a088aaeb812c5d5cefb97438340d5f710850a
                                            • Instruction ID: b04407925060f50ede98982ca7d129cebf55f2a319331d987b8b91cfb4dff558
                                            • Opcode Fuzzy Hash: 8c3b320d994da995ba90cd8df03a088aaeb812c5d5cefb97438340d5f710850a
                                            • Instruction Fuzzy Hash: E2410271D00618CFDB24DFA9C8847CDBBB1FF99308F1081A9D518AB251DB756946CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 45 1213de4-1215431 CreateActCtxA 48 1215433-1215439 45->48 49 121543a-1215494 45->49 48->49 56 12154a3-12154a7 49->56 57 1215496-1215499 49->57 58 12154a9-12154b5 56->58 59 12154b8 56->59 57->56 58->59 61 12154b9 59->61 61->61
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01215421
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 7d2e344f2c85b7c6989fed004415b89155b8eb6e0f8cfb33d5cbd4347b435ad0
                                            • Instruction ID: 9cd4df844583167f023842e26f32724f7be962d04108c2a8be0c17683a27fa77
                                            • Opcode Fuzzy Hash: 7d2e344f2c85b7c6989fed004415b89155b8eb6e0f8cfb33d5cbd4347b435ad0
                                            • Instruction Fuzzy Hash: 93412270D00218CFEB20DFA9C84478EBBF1FF89308F1081AAD508AB251DBB46946CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 62 1219840-121b98c DuplicateHandle 64 121b995-121b9b2 62->64 65 121b98e-121b994 62->65 65->64
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0121B8BE,?,?,?,?,?), ref: 0121B97F
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 2a46f914a69b424aee3175eee87d7d24b04a2011c819bd56234d5a4039b4aba5
                                            • Instruction ID: 9d3f2191edb504b8b25fd196a709279e4923416090227e62893c26c0e0346df2
                                            • Opcode Fuzzy Hash: 2a46f914a69b424aee3175eee87d7d24b04a2011c819bd56234d5a4039b4aba5
                                            • Instruction Fuzzy Hash: 962103B5D102089FDB10CF9AD484ADEBBF5EB48324F14801AE918B3310D374A955CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 68 121b8f3-121b98c DuplicateHandle 69 121b995-121b9b2 68->69 70 121b98e-121b994 68->70 70->69
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0121B8BE,?,?,?,?,?), ref: 0121B97F
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 0dadc6d8cf7402a07421c9dda90ad3e4aca1ef9fda3ab77e1a007e1b9162826c
                                            • Instruction ID: fcf8e0b4e74337a1c30f70c872578ff02be2d8460559e058e6a8bc61b7a30467
                                            • Opcode Fuzzy Hash: 0dadc6d8cf7402a07421c9dda90ad3e4aca1ef9fda3ab77e1a007e1b9162826c
                                            • Instruction Fuzzy Hash: 5721E2B5D002099FDB10CFAAD484ADEFBF5FB48324F14801AE918A7310D374A955CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 73 1219b30-1219b35 74 1219b37-1219b78 73->74 75 1219b2c-1219b2e 73->75 76 1219b80-1219baf LoadLibraryExW 74->76 77 1219b7a-1219b7d 74->77 75->73 78 1219bb1-1219bb7 76->78 79 1219bb8-1219bd5 76->79 77->76 78->79
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01219991,00000800,00000000,00000000), ref: 01219BA2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f8a4190d6fd3b9c499adc139516f2bf59810e6ae7c3e910e0c6abc3a21783cc6
                                            • Instruction ID: 1e1c8b872981bcbe70a60d4b7af263af3358f72b42ba9fc84ba363306a17b042
                                            • Opcode Fuzzy Hash: f8a4190d6fd3b9c499adc139516f2bf59810e6ae7c3e910e0c6abc3a21783cc6
                                            • Instruction Fuzzy Hash: 682136B6C003498FDB10CFAAC444ADEFBF5EB99314F05846AD519A7600D374A98ACFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 82 12194b8-1219b78 84 1219b80-1219baf LoadLibraryExW 82->84 85 1219b7a-1219b7d 82->85 86 1219bb1-1219bb7 84->86 87 1219bb8-1219bd5 84->87 85->84 86->87
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01219991,00000800,00000000,00000000), ref: 01219BA2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 61c6643ab107b4aef5cf12e508aa929fd6d35b749cbadb95350ae9654e388f12
                                            • Instruction ID: 688db5e1c74881ba861c8f3222e904c5b4d0e8239170f2cb3c401a5b547a50a0
                                            • Opcode Fuzzy Hash: 61c6643ab107b4aef5cf12e508aa929fd6d35b749cbadb95350ae9654e388f12
                                            • Instruction Fuzzy Hash: B41103B69002099FDB10DF9AC444ADEFBF5EB98324F14842AD919A7200D374AA85CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 90 12198a8-12198ad 91 12198a4-12198a6 90->91 92 12198af-12198f0 90->92 91->90 93 12198f2-12198f5 92->93 94 12198f8-1219923 GetModuleHandleW 92->94 93->94 95 1219925-121992b 94->95 96 121992c-1219940 94->96 95->96
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,012192DB), ref: 01219916
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: bd04501a34cea11c9bc1e1ae16740289502ee73e795d92fe36015d00030d208f
                                            • Instruction ID: 7e6a5d1c4834eb55960e7994ae6ba7c12383798866a9f4d269d6d68596998826
                                            • Opcode Fuzzy Hash: bd04501a34cea11c9bc1e1ae16740289502ee73e795d92fe36015d00030d208f
                                            • Instruction Fuzzy Hash: 161142B1C002498FDB11CF9AC4847CEBBF5EF89224F11805AD928A7201C378A586CFA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 98 1218240-12198f0 100 12198f2-12198f5 98->100 101 12198f8-1219923 GetModuleHandleW 98->101 100->101 102 1219925-121992b 101->102 103 121992c-1219940 101->103 102->103
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,012192DB), ref: 01219916
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.404890284.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1210000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 72dd4d2f97332d6bb69ebe36cb943d6d388841ea25b4012754d1198f6820f4db
                                            • Instruction ID: 57fa7656b7425ecd4dc20a3f5b1c746bc3c99f84252e769059d2ee493942664d
                                            • Opcode Fuzzy Hash: 72dd4d2f97332d6bb69ebe36cb943d6d388841ea25b4012754d1198f6820f4db
                                            • Instruction Fuzzy Hash: 5D1132B5D006498FDF10DF9AC444BDEFBF5EB89228F10802AD929B7600C374A586CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 105 5ac9dc8-5ac9e2d FindCloseChangeNotification 106 5ac9e2f-5ac9e35 105->106 107 5ac9e36-5ac9e5e 105->107 106->107
                                            APIs
                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 05AC9E20
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.411987992.0000000005AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_5ac0000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: ChangeCloseFindNotification
                                            • String ID:
                                            • API String ID: 2591292051-0
                                            • Opcode ID: 081a16fce556cec399332e7de13cc3aab9621dbfa23191b51ec15b67f78f32af
                                            • Instruction ID: 99d9f1534fc417ea49132c61acf245585201ccadc140c3883b1d694cccbc40a2
                                            • Opcode Fuzzy Hash: 081a16fce556cec399332e7de13cc3aab9621dbfa23191b51ec15b67f78f32af
                                            • Instruction Fuzzy Hash: 341133B18007098FCB20DF9AC444BDEBBF4EB48324F14845AD568A7340C338A984CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 110 5ac93d8-5ac9442 PostMessageW 111 5ac944b-5ac945f 110->111 112 5ac9444-5ac944a 110->112 112->111
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 05AC9435
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.411987992.0000000005AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_5ac0000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 02599b8fbba9fe912fbadb52c4b420e144e995ddfce86475cf741a8e33f9b419
                                            • Instruction ID: 0c7d90a487da633d6981885efdc5288534ee539c36636fb21d5877f3246e1d10
                                            • Opcode Fuzzy Hash: 02599b8fbba9fe912fbadb52c4b420e144e995ddfce86475cf741a8e33f9b419
                                            • Instruction Fuzzy Hash: 0011D0B58002499FDB10DF9AC984BDEBFF8FB48324F10845AE559A7600C374A994CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.403681541.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_bcd000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 746e020e961bd77ce0b16d14018d68ef68b4ab630aabb65f7bad15206ed34bda
                                            • Instruction ID: 5988e2f7c93ff50eed6e991ae8329e790fe9277d9f6fb83194a669904f0f7f01
                                            • Opcode Fuzzy Hash: 746e020e961bd77ce0b16d14018d68ef68b4ab630aabb65f7bad15206ed34bda
                                            • Instruction Fuzzy Hash: B4210675504240DFDB15DF10D9C0F26BBA5FB98328F2485BDE9094B246C336D856C7A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.403681541.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_bcd000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 550b37b6964cef88e04bf56cf3ed8c93bbb64104914b8e9b4460ec88b1e882bf
                                            • Instruction ID: b6c9ab81262f24f3b6411b1f87411ce0f4ac2220f269d6903dd14aeb3659f992
                                            • Opcode Fuzzy Hash: 550b37b6964cef88e04bf56cf3ed8c93bbb64104914b8e9b4460ec88b1e882bf
                                            • Instruction Fuzzy Hash: 4411B176504280CFDB11CF10D9C4B16BFB1FB94324F24C6ADD8450B656C336D856CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.403681541.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_bcd000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 509c2c1a5643478cc4a523ead03d9cb9e61b4addabb80f6d15ee88ac96b65cc9
                                            • Instruction ID: 3a90aef6f38862a78dbc3f93c48242925775b55779469703a9afe37a1859619e
                                            • Opcode Fuzzy Hash: 509c2c1a5643478cc4a523ead03d9cb9e61b4addabb80f6d15ee88ac96b65cc9
                                            • Instruction Fuzzy Hash: 3E01F275508340AAE7115E26CCC4F66BBE8EF45368F1885AFEA085B246D7789C44CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.403681541.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_bcd000_UmpBcHBDbXhaX.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a289537f02d53181f337d25d54180d574a1900e62f4ea3109a5e5e4a39fbc12e
                                            • Instruction ID: 0537eba0a6d53dce6b6798906651a26d1eefc1590b90ceba497a770e12841b45
                                            • Opcode Fuzzy Hash: a289537f02d53181f337d25d54180d574a1900e62f4ea3109a5e5e4a39fbc12e
                                            • Instruction Fuzzy Hash: 52F0C275504244AAEB108E15CCC8B62FFE8EB41374F18C59AED081B686C378AC44CAB0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:18.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:212
                                            Total number of Limit Nodes:18
                                            execution_graph 31489 10b0448 31490 10b0455 31489->31490 31494 10b0868 31490->31494 31502 10b0878 31490->31502 31491 10b045b 31496 10b084c 31494->31496 31496->31494 31498 10b0a57 VirtualAllocExNuma 31496->31498 31501 10b0a0e 31496->31501 31510 10b042c 31496->31510 31514 10b0554 31496->31514 31500 10b0b1d 31498->31500 31500->31491 31501->31491 31506 10b0893 31502->31506 31503 10b0554 Sleep 31503->31506 31504 10b042c VirtualAllocExNuma 31504->31506 31505 10b0a57 VirtualAllocExNuma 31509 10b0b1d 31505->31509 31506->31503 31506->31504 31506->31505 31508 10b0a0e 31506->31508 31508->31491 31509->31491 31511 10b0aa0 VirtualAllocExNuma 31510->31511 31513 10b0b1d 31511->31513 31513->31496 31515 10b0b58 Sleep 31514->31515 31517 10b0bc6 31515->31517 31517->31496 31641 10bbb78 31642 10bbb96 31641->31642 31645 10bb754 31642->31645 31644 10bbbcd 31646 10bd698 LoadLibraryA 31645->31646 31648 10bd774 31646->31648 31518 60fb9c8 31519 60fb9ee 31518->31519 31522 60f9b7c 31519->31522 31525 60f9b87 31522->31525 31523 60fdf49 31527 60fdf47 31523->31527 31542 60fceb4 31523->31542 31525->31523 31526 60fdf39 31525->31526 31530 60fe060 31526->31530 31536 60fe070 31526->31536 31527->31527 31532 60fe07e 31530->31532 31531 60fceb4 3 API calls 31531->31532 31532->31531 31533 60fe16b 31532->31533 31549 60fe638 31532->31549 31554 60fe648 31532->31554 31533->31527 31538 60fe07e 31536->31538 31537 60fceb4 3 API calls 31537->31538 31538->31537 31539 60fe16b 31538->31539 31540 60fe638 2 API calls 31538->31540 31541 60fe648 2 API calls 31538->31541 31539->31527 31540->31538 31541->31538 31543 60fcebf 31542->31543 31544 60fe28c 31543->31544 31545 60fe1e2 31543->31545 31546 60f9b7c 2 API calls 31544->31546 31547 60fe23a CallWindowProcW 31545->31547 31548 60fe1e9 31545->31548 31546->31548 31547->31548 31548->31527 31550 60fe63d 31549->31550 31551 60fe86e 31550->31551 31559 60fecb0 31550->31559 31565 60fecc0 31550->31565 31551->31532 31556 60fe654 31554->31556 31555 60fe86e 31555->31532 31556->31555 31557 60fecb0 2 API calls 31556->31557 31558 60fecc0 2 API calls 31556->31558 31557->31556 31558->31556 31560 60feccb 31559->31560 31561 60fecdb 31559->31561 31560->31561 31571 60fecf8 31560->31571 31585 60fed08 31560->31585 31561->31550 31562 60fecf1 31562->31550 31566 60fecc8 31565->31566 31567 60fecdb 31566->31567 31569 60fecf8 2 API calls 31566->31569 31570 60fed08 2 API calls 31566->31570 31567->31550 31568 60fecf1 31568->31550 31569->31568 31570->31568 31572 60fed1a 31571->31572 31573 60fed35 31572->31573 31575 60fed79 31572->31575 31580 60fecf8 2 API calls 31573->31580 31581 60fed08 2 API calls 31573->31581 31599 60fedc1 31573->31599 31574 60fed3b 31574->31562 31578 60fedf5 31575->31578 31607 60feed0 31575->31607 31576 60fee17 31576->31562 31577 60fedf9 31577->31562 31578->31577 31612 60fefd0 31578->31612 31616 60fefca 31578->31616 31580->31574 31581->31574 31586 60fed1a 31585->31586 31587 60fed35 31586->31587 31588 60fed79 31586->31588 31596 60fecf8 2 API calls 31587->31596 31597 60fed08 2 API calls 31587->31597 31598 60fedc1 2 API calls 31587->31598 31589 60fedf5 31588->31589 31595 60feed0 OleInitialize 31588->31595 31591 60fedf9 31589->31591 31592 60fefca OleGetClipboard 31589->31592 31593 60fefd0 OleGetClipboard 31589->31593 31590 60fee17 31590->31562 31591->31562 31592->31590 31593->31590 31594 60fed3b 31594->31562 31595->31589 31596->31594 31597->31594 31598->31594 31600 60fed90 31599->31600 31605 60fedf5 31600->31605 31606 60feed0 OleInitialize 31600->31606 31601 60fee17 31601->31574 31602 60fedf9 31602->31574 31603 60fefca OleGetClipboard 31603->31601 31604 60fefd0 OleGetClipboard 31604->31601 31605->31602 31605->31603 31605->31604 31606->31605 31608 60feeda 31607->31608 31610 60feeb1 31607->31610 31609 60feefb 31608->31609 31620 60fd0a4 31608->31620 31609->31578 31610->31578 31614 60fefe5 31612->31614 31615 60ff00b 31614->31615 31623 60feb08 31614->31623 31615->31576 31618 60fefe5 31616->31618 31617 60feb08 OleGetClipboard 31617->31618 31618->31617 31619 60ff00b 31618->31619 31619->31576 31621 60fef30 OleInitialize 31620->31621 31622 60fef94 31621->31622 31622->31609 31624 60ff078 OleGetClipboard 31623->31624 31626 60ff112 31624->31626 31649 10b4c30 31650 10b4c44 31649->31650 31653 10b5282 31650->31653 31651 10b4c4d 31654 10b528b 31653->31654 31659 10b5368 31653->31659 31664 10b5464 31653->31664 31669 10b5357 31653->31669 31674 10b547e 31653->31674 31654->31651 31660 10b53ac 31659->31660 31661 10b54a3 31660->31661 31679 10b575f 31660->31679 31684 10b5770 31660->31684 31665 10b5417 31664->31665 31666 10b54a3 31665->31666 31667 10b575f 2 API calls 31665->31667 31668 10b5770 2 API calls 31665->31668 31667->31666 31668->31666 31670 10b53ac 31669->31670 31671 10b54a3 31670->31671 31672 10b575f 2 API calls 31670->31672 31673 10b5770 2 API calls 31670->31673 31672->31671 31673->31671 31675 10b5491 31674->31675 31676 10b54a3 31674->31676 31677 10b575f 2 API calls 31675->31677 31678 10b5770 2 API calls 31675->31678 31677->31676 31678->31676 31680 10b577e 31679->31680 31689 10b57af 31680->31689 31693 10b57c0 31680->31693 31681 10b578e 31681->31661 31685 10b577e 31684->31685 31687 10b57af RtlEncodePointer 31685->31687 31688 10b57c0 RtlEncodePointer 31685->31688 31686 10b578e 31686->31661 31687->31686 31688->31686 31690 10b57bd 31689->31690 31691 10b5824 RtlEncodePointer 31690->31691 31692 10b584d 31690->31692 31691->31692 31692->31681 31694 10b57fa 31693->31694 31695 10b5824 RtlEncodePointer 31694->31695 31696 10b584d 31694->31696 31695->31696 31696->31681 31627 60fd0c0 31628 60fd126 31627->31628 31632 60fd272 31628->31632 31635 60fd280 31628->31635 31629 60fd1d5 31638 60fcc68 31632->31638 31636 60fd2ae 31635->31636 31637 60fcc68 DuplicateHandle 31635->31637 31636->31629 31637->31636 31639 60fd2e8 DuplicateHandle 31638->31639 31640 60fd2ae 31639->31640 31640->31629 31697 60fe550 31698 60fe560 31697->31698 31701 60fcf4c 31698->31701 31702 60fe5a0 KiUserCallbackDispatcher 31701->31702 31704 60fe567 31702->31704 31705 60f97d0 31706 60f97e3 31705->31706 31709 60f9810 31706->31709 31707 60f97ee 31710 60f9826 31709->31710 31711 60f985a 31710->31711 31714 60f9e58 31710->31714 31721 60f9e68 31710->31721 31711->31707 31715 60f9e65 31714->31715 31728 60fa2d8 31715->31728 31716 60f9f39 31716->31716 31722 60f9e92 31721->31722 31727 60fa2d8 2 API calls 31722->31727 31723 60f9f10 31724 60f9f39 31723->31724 31725 60fb791 2 API calls 31723->31725 31726 60fb7c0 CreateWindowExW 31723->31726 31725->31724 31726->31724 31727->31723 31729 60fa2e0 31728->31729 31730 60f9f10 31729->31730 31743 60fa4e1 31729->31743 31748 60fa4f0 31729->31748 31730->31716 31733 60fb7c0 31730->31733 31736 60fb791 31730->31736 31734 60fb7f5 31733->31734 31753 60f9b54 31733->31753 31734->31716 31737 60fb7fe CreateWindowExW 31736->31737 31738 60fb7c6 31736->31738 31742 60fb934 31737->31742 31739 60f9b54 CreateWindowExW 31738->31739 31740 60fb7f5 31739->31740 31740->31716 31746 60fa505 31743->31746 31744 60fa74f 31744->31730 31745 60fa878 GetModuleHandleW 31747 60fa8a5 31745->31747 31746->31744 31746->31745 31747->31730 31749 60fa505 31748->31749 31750 60fa74f 31749->31750 31751 60fa878 GetModuleHandleW 31749->31751 31750->31730 31752 60fa8a5 31751->31752 31752->31730 31754 60fb810 CreateWindowExW 31753->31754 31756 60fb934 31754->31756
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D0rl$D0rl$D0rl
                                            • API String ID: 0-100519504
                                            • Opcode ID: 6290bae4e85e39a5d5582de65774ea0e14490e436ae05a5a329e7ea477e8fc8d
                                            • Instruction ID: a5d785b23ec6a1ecc027dc8a0bcc1f93d139b438c4cc94288cb47419d3e5eba0
                                            • Opcode Fuzzy Hash: 6290bae4e85e39a5d5582de65774ea0e14490e436ae05a5a329e7ea477e8fc8d
                                            • Instruction Fuzzy Hash: F7727170A14229AFCB14CF69C844AAEBBF2FF98304F15846AE506EB365DB34DD41CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b89e24b958ebd6d384d83aaa8df8d607741c8acd21612c6eedbd60cd03b252cc
                                            • Instruction ID: 9d2a87b83b99d0a1c0f53dd70cd7b5bbd86d2539f3026750bd7de5cb1117aee6
                                            • Opcode Fuzzy Hash: b89e24b958ebd6d384d83aaa8df8d607741c8acd21612c6eedbd60cd03b252cc
                                            • Instruction Fuzzy Hash: 6B826D30A04219DFCB14DF68C984AAEBBF2FF59319F15855AE40ADB2A1C731EC42CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 5d264b8-5d264cf 1 5d264d1-5d264d4 0->1 2 5d264d6-5d264d9 1->2 3 5d264e5-5d264e8 1->3 8 5d264e0 2->8 4 5d264ea-5d264f4 3->4 5 5d264f9-5d264fc 3->5 4->5 6 5d26503-5d26506 5->6 7 5d264fe 5->7 10 5d26508-5d26537 6->10 11 5d2653c-5d2653f 6->11 7->6 8->3 10->11 12 5d26541 11->12 13 5d2654c-5d2654f 11->13 166 5d26541 call 5d272d8 12->166 167 5d26541 call 5d272c8 12->167 168 5d26541 call 5d2739c 12->168 14 5d26551 13->14 15 5d26584-5d26587 13->15 169 5d26557 call 60f9250 14->169 170 5d26557 call 60f91a0 14->170 18 5d2659b-5d2659e 15->18 19 5d26589-5d26590 15->19 17 5d26547 17->13 24 5d265a0-5d265a3 18->24 25 5d265af-5d265b2 18->25 21 5d26596 19->21 22 5d2686b-5d26872 19->22 20 5d2655d-5d26563 30 5d26569-5d2657f 20->30 31 5d2694c-5d26977 20->31 21->18 28 5d26944-5d2694b 22->28 29 5d26878 22->29 36 5d265aa 24->36 26 5d265c3-5d265c6 25->26 27 5d265b4-5d265b7 25->27 33 5d265e2-5d265e5 26->33 34 5d265c8-5d265dd 26->34 37 5d265be 27->37 32 5d2687d-5d26880 29->32 30->15 45 5d26979-5d2697c 31->45 38 5d268c2-5d268c5 32->38 39 5d26882-5d268bd 32->39 41 5d265e7-5d265f0 33->41 42 5d265f5-5d265f8 33->42 34->33 36->25 37->26 48 5d268d6-5d268d9 38->48 49 5d268c7-5d268ca 38->49 39->38 41->42 46 5d2663a-5d2663d 42->46 47 5d265fa-5d26635 42->47 56 5d26986-5d26989 45->56 57 5d2697e-5d26983 45->57 53 5d26659-5d2665c 46->53 54 5d2663f-5d26654 46->54 47->46 50 5d268e6-5d268e9 48->50 51 5d268db-5d268e1 48->51 58 5d268d1 49->58 59 5d268fa-5d268fd 50->59 60 5d268eb-5d268ee 50->60 51->50 61 5d26672-5d26675 53->61 62 5d2665e-5d26668 call 5d2627c 53->62 54->53 63 5d26993-5d26996 56->63 64 5d2698b-5d26990 56->64 57->56 58->48 71 5d26932-5d26934 59->71 72 5d268ff-5d2692d 59->72 80 5d268f5 60->80 66 5d26677-5d26689 61->66 67 5d266aa-5d266ad 61->67 96 5d2666d 62->96 73 5d269c5-5d269c8 63->73 74 5d26998-5d269c0 63->74 64->63 66->31 97 5d2668f-5d266a5 66->97 81 5d266c3-5d266c6 67->81 82 5d266af-5d266be 67->82 76 5d26936 71->76 77 5d2693b-5d2693e 71->77 72->71 78 5d269ca-5d269d1 73->78 79 5d269d8-5d269db 73->79 74->73 76->77 77->1 77->28 86 5d269d3 78->86 87 5d269e6-5d269e8 78->87 89 5d269e1-5d269e4 79->89 90 5d269dd-5d269e0 79->90 80->59 92 5d266c8-5d266f7 81->92 93 5d266fc-5d266ff 81->93 82->81 86->79 98 5d269eb-5d269ee 87->98 89->87 89->98 92->93 101 5d26701-5d26717 93->101 102 5d2671c-5d2671f 93->102 96->61 97->67 103 5d269f0-5d269f7 98->103 104 5d269fe-5d26a01 98->104 101->102 107 5d26761-5d26764 102->107 108 5d26721-5d2675c 102->108 103->64 113 5d269f9 103->113 114 5d26a03-5d26a06 104->114 115 5d26a34-5d26a36 104->115 110 5d267a6-5d267a9 107->110 111 5d26766-5d267a1 107->111 108->107 120 5d267c0-5d267c3 110->120 121 5d267ab-5d267b3 110->121 111->110 113->104 118 5d26a08-5d26a28 114->118 119 5d26a2f-5d26a32 114->119 124 5d26a38 115->124 125 5d26a59-5d26a5c 115->125 118->115 163 5d26a2a 118->163 119->115 130 5d26a3d-5d26a40 119->130 128 5d267e0-5d267e3 120->128 129 5d267c5-5d267db 120->129 150 5d267bb 121->150 124->130 138 5d26825-5d26828 128->138 139 5d267e5-5d26820 128->139 129->128 136 5d26a42 130->136 137 5d26a47-5d26a49 130->137 136->137 144 5d26a50-5d26a53 137->144 145 5d26a4b 137->145 140 5d2682a-5d26831 138->140 141 5d2683d-5d26840 138->141 139->138 152 5d26838 140->152 147 5d26842 141->147 148 5d2684d-5d26850 141->148 144->45 144->125 145->144 159 5d26848 147->159 154 5d26852-5d26861 148->154 155 5d26866-5d26869 148->155 150->120 152->141 154->155 155->22 155->32 159->148 163->119 166->17 167->17 168->17 169->20 170->20
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: xml$xml$xml$xml$xml
                                            • API String ID: 0-1082835255
                                            • Opcode ID: f4f24082d2a787d5a44019645205f26b520862d68319f018198a262d3ec04ddc
                                            • Instruction ID: 09db6990cb742c1e0f870ea37bea04ca819dbc5498a853e9fc5c41a1fec36ab9
                                            • Opcode Fuzzy Hash: f4f24082d2a787d5a44019645205f26b520862d68319f018198a262d3ec04ddc
                                            • Instruction Fuzzy Hash: C9E1B030A043508BDB34AB7CC4557AE76A2EB96318F10493ED05ADB790DF39DC85CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 171 5d26490-5d264cf 174 5d264d1-5d264d4 171->174 175 5d264d6-5d264d9 174->175 176 5d264e5-5d264e8 174->176 181 5d264e0 175->181 177 5d264ea-5d264f4 176->177 178 5d264f9-5d264fc 176->178 177->178 179 5d26503-5d26506 178->179 180 5d264fe 178->180 183 5d26508-5d26537 179->183 184 5d2653c-5d2653f 179->184 180->179 181->176 183->184 185 5d26541 184->185 186 5d2654c-5d2654f 184->186 339 5d26541 call 5d272d8 185->339 340 5d26541 call 5d272c8 185->340 341 5d26541 call 5d2739c 185->341 187 5d26551 186->187 188 5d26584-5d26587 186->188 342 5d26557 call 60f9250 187->342 343 5d26557 call 60f91a0 187->343 191 5d2659b-5d2659e 188->191 192 5d26589-5d26590 188->192 190 5d26547 190->186 197 5d265a0-5d265a3 191->197 198 5d265af-5d265b2 191->198 194 5d26596 192->194 195 5d2686b-5d26872 192->195 193 5d2655d-5d26563 203 5d26569-5d2657f 193->203 204 5d2694c-5d26977 193->204 194->191 201 5d26944-5d2694b 195->201 202 5d26878 195->202 209 5d265aa 197->209 199 5d265c3-5d265c6 198->199 200 5d265b4-5d265b7 198->200 206 5d265e2-5d265e5 199->206 207 5d265c8-5d265dd 199->207 210 5d265be 200->210 205 5d2687d-5d26880 202->205 203->188 218 5d26979-5d2697c 204->218 211 5d268c2-5d268c5 205->211 212 5d26882-5d268bd 205->212 214 5d265e7-5d265f0 206->214 215 5d265f5-5d265f8 206->215 207->206 209->198 210->199 221 5d268d6-5d268d9 211->221 222 5d268c7-5d268ca 211->222 212->211 214->215 219 5d2663a-5d2663d 215->219 220 5d265fa-5d26635 215->220 229 5d26986-5d26989 218->229 230 5d2697e-5d26983 218->230 226 5d26659-5d2665c 219->226 227 5d2663f-5d26654 219->227 220->219 223 5d268e6-5d268e9 221->223 224 5d268db-5d268e1 221->224 231 5d268d1 222->231 232 5d268fa-5d268fd 223->232 233 5d268eb-5d268ee 223->233 224->223 234 5d26672-5d26675 226->234 235 5d2665e-5d26668 call 5d2627c 226->235 227->226 236 5d26993-5d26996 229->236 237 5d2698b-5d26990 229->237 230->229 231->221 244 5d26932-5d26934 232->244 245 5d268ff-5d2692d 232->245 253 5d268f5 233->253 239 5d26677-5d26689 234->239 240 5d266aa-5d266ad 234->240 269 5d2666d 235->269 246 5d269c5-5d269c8 236->246 247 5d26998-5d269c0 236->247 237->236 239->204 270 5d2668f-5d266a5 239->270 254 5d266c3-5d266c6 240->254 255 5d266af-5d266be 240->255 249 5d26936 244->249 250 5d2693b-5d2693e 244->250 245->244 251 5d269ca-5d269d1 246->251 252 5d269d8-5d269db 246->252 247->246 249->250 250->174 250->201 259 5d269d3 251->259 260 5d269e6-5d269e8 251->260 262 5d269e1-5d269e4 252->262 263 5d269dd-5d269e0 252->263 253->232 265 5d266c8-5d266f7 254->265 266 5d266fc-5d266ff 254->266 255->254 259->252 271 5d269eb-5d269ee 260->271 262->260 262->271 265->266 274 5d26701-5d26717 266->274 275 5d2671c-5d2671f 266->275 269->234 270->240 276 5d269f0-5d269f7 271->276 277 5d269fe-5d26a01 271->277 274->275 280 5d26761-5d26764 275->280 281 5d26721-5d2675c 275->281 276->237 286 5d269f9 276->286 287 5d26a03-5d26a06 277->287 288 5d26a34-5d26a36 277->288 283 5d267a6-5d267a9 280->283 284 5d26766-5d267a1 280->284 281->280 293 5d267c0-5d267c3 283->293 294 5d267ab-5d267b3 283->294 284->283 286->277 291 5d26a08-5d26a28 287->291 292 5d26a2f-5d26a32 287->292 297 5d26a38 288->297 298 5d26a59-5d26a5c 288->298 291->288 336 5d26a2a 291->336 292->288 303 5d26a3d-5d26a40 292->303 301 5d267e0-5d267e3 293->301 302 5d267c5-5d267db 293->302 323 5d267bb 294->323 297->303 311 5d26825-5d26828 301->311 312 5d267e5-5d26820 301->312 302->301 309 5d26a42 303->309 310 5d26a47-5d26a49 303->310 309->310 317 5d26a50-5d26a53 310->317 318 5d26a4b 310->318 313 5d2682a-5d26831 311->313 314 5d2683d-5d26840 311->314 312->311 325 5d26838 313->325 320 5d26842 314->320 321 5d2684d-5d26850 314->321 317->218 317->298 318->317 332 5d26848 320->332 327 5d26852-5d26861 321->327 328 5d26866-5d26869 321->328 323->293 325->314 327->328 328->195 328->205 332->321 336->292 339->190 340->190 341->190 342->193 343->193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: xml$xml$xml$xml$xml
                                            • API String ID: 0-1082835255
                                            • Opcode ID: 438bbcc16e99ef920bfcab323d38a582624788f120c9c2e8fff52a09a4672ac8
                                            • Instruction ID: 5749f3d7994133f267d89c45761a698986ff7ad194edc7bb867642b8a1be0467
                                            • Opcode Fuzzy Hash: 438bbcc16e99ef920bfcab323d38a582624788f120c9c2e8fff52a09a4672ac8
                                            • Instruction Fuzzy Hash: 3DC1B334A043508BDB34AB7CC0556ADB6B2EB95318F10493ED05ADB790DF39DC85CBA6
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \ml
                                            • API String ID: 0-2093625911
                                            • Opcode ID: 17500fe923f5457944ea301bbddabf166b402dfaec36c869d2be91b99e2ac274
                                            • Instruction ID: ba67599920dfcddd883531cc25750adee8e9b76ef113f67a280886db6ebf9a3b
                                            • Opcode Fuzzy Hash: 17500fe923f5457944ea301bbddabf166b402dfaec36c869d2be91b99e2ac274
                                            • Instruction Fuzzy Hash: 8EC20630B0D3854FD7069774CC65BAA7BF2AB96304F1A84B7E548DB392DA28DC4AC711
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2265 5d2b873-5d2b88d 2266 5d2b895-5d2b897 2265->2266 2267 5d2b88f-5d2b893 2265->2267 2269 5d2baa8-5d2baaf 2266->2269 2267->2266 2268 5d2b89c-5d2b8a7 2267->2268 2270 5d2bab0 2268->2270 2271 5d2b8ad-5d2b8b4 2268->2271 2274 5d2bab5-5d2baed 2270->2274 2272 5d2b8ba-5d2b8c9 2271->2272 2273 5d2ba49-5d2ba4f 2271->2273 2272->2274 2275 5d2b8cf-5d2b8de 2272->2275 2276 5d2ba51-5d2ba53 2273->2276 2277 5d2ba55-5d2ba59 2273->2277 2303 5d2baf6-5d2bafa 2274->2303 2304 5d2baef-5d2baf4 2274->2304 2283 5d2b8f3-5d2b8f6 2275->2283 2284 5d2b8e0-5d2b8e3 2275->2284 2276->2269 2278 5d2baa6 2277->2278 2279 5d2ba5b-5d2ba61 2277->2279 2278->2269 2279->2270 2280 5d2ba63-5d2ba66 2279->2280 2280->2270 2285 5d2ba68-5d2ba7d 2280->2285 2287 5d2b902-5d2b908 2283->2287 2289 5d2b8f8-5d2b8fb 2283->2289 2284->2287 2288 5d2b8e5-5d2b8e8 2284->2288 2301 5d2baa1-5d2baa4 2285->2301 2302 5d2ba7f-5d2ba85 2285->2302 2296 5d2b920-5d2b93d 2287->2296 2297 5d2b90a-5d2b910 2287->2297 2290 5d2b9e9-5d2b9ef 2288->2290 2291 5d2b8ee 2288->2291 2292 5d2b94e-5d2b954 2289->2292 2293 5d2b8fd 2289->2293 2307 5d2b9f1-5d2b9f7 2290->2307 2308 5d2ba07-5d2ba11 2290->2308 2298 5d2ba14-5d2ba21 2291->2298 2299 5d2b956-5d2b95c 2292->2299 2300 5d2b96c-5d2b97e 2292->2300 2293->2298 2336 5d2b946-5d2b949 2296->2336 2305 5d2b912 2297->2305 2306 5d2b914-5d2b91e 2297->2306 2327 5d2ba23-5d2ba27 2298->2327 2328 5d2ba35-5d2ba37 2298->2328 2309 5d2b960-5d2b96a 2299->2309 2310 5d2b95e 2299->2310 2330 5d2b980-5d2b98c 2300->2330 2331 5d2b98e-5d2b9b1 2300->2331 2301->2269 2311 5d2ba97-5d2ba9a 2302->2311 2312 5d2ba87-5d2ba95 2302->2312 2313 5d2bb00-5d2bb02 2303->2313 2304->2313 2305->2296 2306->2296 2314 5d2b9fb-5d2ba05 2307->2314 2315 5d2b9f9 2307->2315 2308->2298 2309->2300 2310->2300 2311->2270 2317 5d2ba9c-5d2ba9f 2311->2317 2312->2270 2312->2311 2321 5d2bb17-5d2bb1e 2313->2321 2322 5d2bb04-5d2bb16 2313->2322 2314->2308 2315->2308 2317->2301 2317->2302 2327->2328 2332 5d2ba29-5d2ba2d 2327->2332 2334 5d2ba3b-5d2ba3e 2328->2334 2340 5d2b9d9-5d2b9e7 2330->2340 2331->2270 2342 5d2b9b7-5d2b9ba 2331->2342 2332->2270 2337 5d2ba33 2332->2337 2334->2270 2338 5d2ba40-5d2ba43 2334->2338 2336->2298 2337->2334 2338->2272 2338->2273 2340->2298 2342->2270 2344 5d2b9c0-5d2b9d2 2342->2344 2344->2340
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Xcrl$Xcrl
                                            • API String ID: 0-1547875148
                                            • Opcode ID: 6ca7e3edf528919b4cb2f840c2a6cf9cd7fceea506e1f2fe766fac9400577f4b
                                            • Instruction ID: 31658fc4862730dafbf56568426b0739219c29f3d306a58b98ef0feda70346b0
                                            • Opcode Fuzzy Hash: 6ca7e3edf528919b4cb2f840c2a6cf9cd7fceea506e1f2fe766fac9400577f4b
                                            • Instruction Fuzzy Hash: EE81D334B04125CFEB14CF69C885A6AB7B2FF98218F158167D416EB361DBB1E841CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2595 60fa4f0-60fa516 2598 60fa518-60fa52f call 60f9adc 2595->2598 2599 60fa546-60fa54e 2595->2599 2607 60fa534-60fa540 2598->2607 2600 60fa594-60fa5dd call 60f9af4 2599->2600 2601 60fa550-60fa555 call 60f9ae8 2599->2601 2622 60fa788-60fa7ba 2600->2622 2623 60fa5e3-60fa62e 2600->2623 2604 60fa55a-60fa58f 2601->2604 2614 60fa631-60fa693 call 60f9b00 2604->2614 2607->2599 2610 60fa75b-60fa781 2607->2610 2610->2622 2643 60fa74f-60fa75a 2614->2643 2644 60fa699-60fa6a6 2614->2644 2637 60fa7c1-60fa870 2622->2637 2623->2614 2650 60fa878-60fa8a3 GetModuleHandleW 2637->2650 2651 60fa872-60fa875 2637->2651 2648 60fa6ac-60fa6d9 call 60f9af4 2644->2648 2649 60fa74b-60fa74d 2644->2649 2648->2649 2660 60fa6db-60fa6e8 2648->2660 2649->2637 2649->2643 2652 60fa8ac-60fa8c0 2650->2652 2653 60fa8a5-60fa8ab 2650->2653 2651->2650 2653->2652 2660->2649 2661 60fa6ea-60fa701 call 60f9b0c 2660->2661 2665 60fa70e-60fa73d call 60f9b00 2661->2665 2666 60fa703-60fa70c call 60f9b00 2661->2666 2665->2649 2674 60fa73f-60fa749 2665->2674 2666->2649 2674->2649 2674->2665
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 060FA896
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 1d8eda56a0b1f1cf80fac0ef6f45b9060e05f07f1936cb3594ef5cf8e23e9ad8
                                            • Instruction ID: 59f143f4b67a0946a1e296451955dd77e483f4b8ae48e56f90dee05db7c39985
                                            • Opcode Fuzzy Hash: 1d8eda56a0b1f1cf80fac0ef6f45b9060e05f07f1936cb3594ef5cf8e23e9ad8
                                            • Instruction Fuzzy Hash: 36B19270B107058FCB94DF79C894A5EBBF2FF88214B008969D51ADB755DB34E805CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2676 5d2778f-5d277a5 2677 5d27773-5d27788 2676->2677 2678 5d277a7-5d277cb 2676->2678 2677->2676 2680 5d277d5-5d27c0b 2678->2680 2756 5d27c17-5d27c24 2680->2756 2758 5d27c2a-5d2804f 2756->2758 2841 5d2805a-5d2805c 2758->2841 2859 5d28061 call 5d298d0 2841->2859 2860 5d28061 call 5d28921 2841->2860 2842 5d28067-5d28093 2846 5d28095-5d280b1 2842->2846 2847 5d280d8-5d280ff 2842->2847 2854 5d280b3-5d280b6 2846->2854 2855 5d280c8-5d280d6 2846->2855 2852 5d28101 2847->2852 2853 5d2810d 2847->2853 2852->2853 2856 5d2810e 2853->2856 2857 5d280bf-5d280c1 2854->2857 2855->2846 2855->2847 2856->2856 2857->2855 2859->2842 2860->2842
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: <
                                            • API String ID: 0-4251816714
                                            • Opcode ID: e929d8873c50643bb991d23942bba59636014730524f7845ea33f63e8655db02
                                            • Instruction ID: 5e62591d46799f7e52cf80dba26fa8c2f848554ec33fc663eb2f1586ab0ddf6f
                                            • Opcode Fuzzy Hash: e929d8873c50643bb991d23942bba59636014730524f7845ea33f63e8655db02
                                            • Instruction Fuzzy Hash: 0C324C74B002199FDB24AB64EC997AD77B2FF88300F5041AAD80AE3394DF315E858F59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2861 10b0878-10b0891 2862 10b0893-10b0896 2861->2862 2863 10b0898-10b08b8 call 10b042c 2862->2863 2864 10b08c4-10b08c7 2862->2864 2885 10b08bd-10b08bf 2863->2885 2865 10b08c9-10b08cc call 10b0554 2864->2865 2866 10b08d6-10b08d9 2864->2866 2871 10b08d1 2865->2871 2869 10b08db-10b08f4 2866->2869 2870 10b0902-10b0905 2866->2870 2883 10b08fa-10b08fd 2869->2883 2884 10b0a57-10b0a82 2869->2884 2872 10b0907-10b0921 2870->2872 2873 10b0926-10b0929 2870->2873 2871->2866 2872->2873 2875 10b092b-10b092d 2873->2875 2876 10b0934-10b0937 2873->2876 2875->2872 2880 10b092f 2875->2880 2881 10b0939 2876->2881 2882 10b0944-10b0947 2876->2882 2880->2876 2925 10b0939 call 5d26490 2881->2925 2926 10b0939 call 5d264b8 2881->2926 2886 10b0949-10b09a1 2882->2886 2887 10b09a6-10b09a9 2882->2887 2883->2870 2896 10b0ac8-10b0b1b VirtualAllocExNuma 2884->2896 2897 10b0a84-10b0ac7 2884->2897 2885->2864 2886->2887 2888 10b09ab 2887->2888 2889 10b09b8-10b09bb 2887->2889 2898 10b09b3 2888->2898 2894 10b09f9-10b09fc 2889->2894 2895 10b09bd-10b09f0 2889->2895 2892 10b093f 2892->2882 2900 10b09fe call 10b0be0 2894->2900 2902 10b0a09-10b0a0c 2894->2902 2895->2900 2901 10b09f2 2895->2901 2905 10b0b1d-10b0b23 2896->2905 2906 10b0b24-10b0b41 2896->2906 2897->2896 2898->2889 2911 10b0a04 2900->2911 2901->2900 2904 10b09f4 2901->2904 2907 10b0a0e-10b0a15 2902->2907 2908 10b0a16-10b0a19 2902->2908 2904->2894 2905->2906 2909 10b0a1b 2908->2909 2910 10b0a20-10b0a23 2908->2910 2909->2910 2913 10b0a30-10b0a33 2910->2913 2914 10b0a25 2910->2914 2911->2902 2916 10b0a3d-10b0a3f 2913->2916 2917 10b0a35-10b0a3c 2913->2917 2923 10b0a25 call 10b279c 2914->2923 2924 10b0a25 call 10b26b0 2914->2924 2918 10b0a41 2916->2918 2919 10b0a46-10b0a49 2916->2919 2918->2919 2919->2862 2921 10b0a4f-10b0a56 2919->2921 2920 10b0a2b 2920->2913 2923->2920 2924->2920 2925->2892 2926->2892
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocNumaVirtual
                                            • String ID:
                                            • API String ID: 4233825816-0
                                            • Opcode ID: d7225b4751e0c637d2bb91a0e97161cf1fd0fb9d49d097da65e8ef523f7a7723
                                            • Instruction ID: 365ffcda48dce06819b2870ff885cf727db0616ece6d1396d3fdffac892994f8
                                            • Opcode Fuzzy Hash: d7225b4751e0c637d2bb91a0e97161cf1fd0fb9d49d097da65e8ef523f7a7723
                                            • Instruction Fuzzy Hash: CC81B070E002488FDF61CFA9D8807DEBBF0EF89324F2045AAE549E7299D7359845CB52
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2927 5d298d0-5d298f3 2928 5d298f5-5d298f8 2927->2928 2929 5d29917-5d2991a 2928->2929 2930 5d298fa-5d29912 2928->2930 2931 5d29938-5d2993b 2929->2931 2932 5d2991c-5d29923 2929->2932 2930->2929 2933 5d299af-5d299b2 2931->2933 2934 5d2993d-5d29978 2931->2934 2936 5d29d0b-5d29d39 2932->2936 2937 5d29929-5d2992d 2932->2937 2939 5d299b8-5d299f1 2933->2939 2940 5d29a66-5d29a69 2933->2940 2988 5d2997a-5d29989 2934->2988 2989 5d2998b-5d29994 2934->2989 2949 5d29d41-5d29d49 2936->2949 2938 5d29933 2937->2938 2937->2939 2938->2931 2996 5d299f3-5d29a04 2939->2996 2997 5d29a06-5d29a18 2939->2997 2944 5d29a6b-5d29a72 2940->2944 2945 5d29a88-5d29a8b 2940->2945 2944->2936 2950 5d29a78-5d29a83 2944->2950 2946 5d29b03-5d29b06 2945->2946 2947 5d29a8d-5d29aac 2945->2947 2951 5d29b08-5d29b1a 2946->2951 2952 5d29b1f-5d29b22 2946->2952 2978 5d29aae-5d29aba 2947->2978 2979 5d29abc 2947->2979 2954 5d29d4b 2949->2954 2955 5d29d99-5d29da1 2949->2955 2950->2945 2951->2952 2961 5d29b92-5d29b95 2952->2961 2962 5d29b24-5d29b4b 2952->2962 2959 5d29da3-5d29dc2 2954->2959 2963 5d29d52-5d29d54 2954->2963 2964 5d29d56-5d29d8d call 5d23f08 2954->2964 2958 5d29d92-5d29d96 2955->2958 2955->2959 2967 5d29b97-5d29bac 2961->2967 2968 5d29bbb-5d29bbe 2961->2968 3000 5d29b5b 2962->3000 3001 5d29b4d-5d29b59 2962->3001 2963->2958 2964->2958 3002 5d29bb4-5d29bb6 2967->3002 2969 5d29bc0 2968->2969 2970 5d29bc5-5d29bc8 2968->2970 2969->2970 2976 5d29c4e-5d29c65 2970->2976 2977 5d29bce-5d29bd1 2970->2977 3060 5d29c67 call 5d298d0 2976->3060 3061 5d29c67 call 5d28921 2976->3061 3062 5d29c67 call 5d29d18 2976->3062 2983 5d29bd3-5d29bdb 2977->2983 2984 5d29c0b-5d29c0e 2977->2984 2985 5d29abe-5d29ada 2978->2985 2979->2985 2991 5d29be9-5d29c06 2983->2991 2992 5d29bdd-5d29bdf 2983->2992 2998 5d29c10-5d29c16 2984->2998 2999 5d29c49-5d29c4c 2984->2999 3012 5d29aea 2985->3012 3013 5d29adc-5d29ae8 2985->3013 2993 5d2999d-5d2999f 2988->2993 2989->2993 3057 5d29997 call 5d2f9f0 2989->3057 3058 5d29997 call 5d2f828 2989->3058 3059 5d29997 call 5d2f819 2989->3059 2991->2984 2992->2991 3008 5d299a7-5d299aa 2993->3008 3021 5d29a1a-5d29a4a 2996->3021 2997->3021 3017 5d29c1f-5d29c24 2998->3017 2999->2976 3003 5d29c7a-5d29c7d 2999->3003 3004 5d29b5d-5d29b6e 3000->3004 3001->3004 3002->2968 3010 5d29cee-5d29cf0 3003->3010 3011 5d29c7f-5d29ccb 3003->3011 3028 5d29b70-5d29b7c 3004->3028 3029 5d29b7e 3004->3029 3008->2933 3009 5d29c6d-5d29c6f 3009->2951 3020 5d29c75 3009->3020 3023 5d29cf2 3010->3023 3024 5d29cf7-5d29cfa 3010->3024 3011->2936 3050 5d29ccd-5d29ce3 call 5d2b240 3011->3050 3025 5d29aec-5d29afe 3012->3025 3013->3025 3026 5d29c26-5d29c32 3017->3026 3027 5d29c34 3017->3027 3020->3003 3051 5d29a52-5d29a5b call 5d23f08 3021->3051 3023->3024 3024->2928 3035 5d29d00-5d29d0a 3024->3035 3025->2946 3030 5d29c36-5d29c44 3026->3030 3027->3030 3038 5d29b81-5d29b8d 3028->3038 3029->3038 3030->2999 3038->2961 3053 5d29ce9 3050->3053 3051->3011 3055 5d29a61 3051->3055 3053->3010 3055->2940 3057->2993 3058->2993 3059->2993 3060->3009 3061->3009 3062->3009
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \ml
                                            • API String ID: 0-2093625911
                                            • Opcode ID: 5d2d3daf3948b28e31d7d50ce496fbd52dbead81242c67ecf9c7d9c0bfef2ac7
                                            • Instruction ID: 684cb78fc167496636b36a2526749879c00187024bd79279e141b5d140c4c6c1
                                            • Opcode Fuzzy Hash: 5d2d3daf3948b28e31d7d50ce496fbd52dbead81242c67ecf9c7d9c0bfef2ac7
                                            • Instruction Fuzzy Hash: 40E18434B042149FDB24DF68D8A4B6DBBB2FF89314F14843AE406EB394DA75DC818B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3063 60fb791-60fb7c4 3064 60fb7fe-60fb876 3063->3064 3065 60fb7c6-60fb7f0 call 60f9b54 3063->3065 3067 60fb878-60fb87e 3064->3067 3068 60fb881-60fb888 3064->3068 3069 60fb7f5-60fb7f6 3065->3069 3067->3068 3070 60fb88a-60fb890 3068->3070 3071 60fb893-60fb932 CreateWindowExW 3068->3071 3070->3071 3073 60fb93b-60fb973 3071->3073 3074 60fb934-60fb93a 3071->3074 3078 60fb975-60fb978 3073->3078 3079 60fb980 3073->3079 3074->3073 3078->3079 3080 60fb981 3079->3080 3080->3080
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 060FB922
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 908571513c0f205b63ebfba50136922bb2a2deeadf27720a1c8b0b58f7e15754
                                            • Instruction ID: 7ea2ab8f9b90f2910f146f3cc41d3a0ff3e5b7fe44cbad65eb656bd91598cba1
                                            • Opcode Fuzzy Hash: 908571513c0f205b63ebfba50136922bb2a2deeadf27720a1c8b0b58f7e15754
                                            • Instruction Fuzzy Hash: 4E5112B1C04249AFDF01CFA9C884ADDBFB2FF48314F15856AE908AB261D7759895CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3081 60f9b54-60fb876 3083 60fb878-60fb87e 3081->3083 3084 60fb881-60fb888 3081->3084 3083->3084 3085 60fb88a-60fb890 3084->3085 3086 60fb893-60fb932 CreateWindowExW 3084->3086 3085->3086 3088 60fb93b-60fb973 3086->3088 3089 60fb934-60fb93a 3086->3089 3093 60fb975-60fb978 3088->3093 3094 60fb980 3088->3094 3089->3088 3093->3094 3095 60fb981 3094->3095 3095->3095
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 060FB922
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: b32687612c0afedd5f519c8e54565cd10476b248fc50f764148f31f62ec63311
                                            • Instruction ID: 00a81eb5e100b0f3633b41fcd5217d6b4a2c89ae9bdeb9639b53817eeee6fd56
                                            • Opcode Fuzzy Hash: b32687612c0afedd5f519c8e54565cd10476b248fc50f764148f31f62ec63311
                                            • Instruction Fuzzy Hash: 2D51CEB1D10349AFDB14CF99C884ADEBFB5FF88310F24852AE919AB250D7749885CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3096 60fceb4-60fe1dc 3099 60fe28c-60fe2ac call 60f9b7c 3096->3099 3100 60fe1e2-60fe1e7 3096->3100 3107 60fe2af-60fe2bc 3099->3107 3102 60fe23a-60fe272 CallWindowProcW 3100->3102 3103 60fe1e9-60fe220 3100->3103 3104 60fe27b-60fe28a 3102->3104 3105 60fe274-60fe27a 3102->3105 3109 60fe229-60fe238 3103->3109 3110 60fe222-60fe228 3103->3110 3104->3107 3105->3104 3109->3107 3110->3109
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 060FE261
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: a198075c1ba2ea2eca02711e74fe09e7af7cfa3d631d70d65e881ad04d74397f
                                            • Instruction ID: 86f96b9bf7519effae698defef6660ce030307f16337d2beab3594d11c162ef3
                                            • Opcode Fuzzy Hash: a198075c1ba2ea2eca02711e74fe09e7af7cfa3d631d70d65e881ad04d74397f
                                            • Instruction Fuzzy Hash: F8415AB4950305DFDB80CF99C488BAAFBF5FB88314F148459E519A7721D735A841CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3113 10bb754-10bd6ef 3115 10bd728-10bd772 LoadLibraryA 3113->3115 3116 10bd6f1-10bd6fb 3113->3116 3123 10bd77b-10bd7ac 3115->3123 3124 10bd774-10bd77a 3115->3124 3116->3115 3117 10bd6fd-10bd6ff 3116->3117 3118 10bd722-10bd725 3117->3118 3119 10bd701-10bd70b 3117->3119 3118->3115 3121 10bd70f-10bd71e 3119->3121 3122 10bd70d 3119->3122 3121->3121 3125 10bd720 3121->3125 3122->3121 3128 10bd7ae-10bd7b2 3123->3128 3129 10bd7bc 3123->3129 3124->3123 3125->3118 3128->3129 3130 10bd7b4 3128->3130 3131 10bd7bd 3129->3131 3130->3129 3131->3131
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 010BD762
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: d8420f250714c839228498317a5a05e051272be8454b0ca9e7dc8f76327172ae
                                            • Instruction ID: 31a328d4be067e519200e5ae73e6b3c7afa578b1238da7406605ad603274437e
                                            • Opcode Fuzzy Hash: d8420f250714c839228498317a5a05e051272be8454b0ca9e7dc8f76327172ae
                                            • Instruction Fuzzy Hash: 2D3113B4D402899FDB14CFA9C8857DEFBF1BB08318F148529E855AB280E7789445CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3132 10bd68d-10bd6ef 3134 10bd728-10bd772 LoadLibraryA 3132->3134 3135 10bd6f1-10bd6fb 3132->3135 3142 10bd77b-10bd7ac 3134->3142 3143 10bd774-10bd77a 3134->3143 3135->3134 3136 10bd6fd-10bd6ff 3135->3136 3137 10bd722-10bd725 3136->3137 3138 10bd701-10bd70b 3136->3138 3137->3134 3140 10bd70f-10bd71e 3138->3140 3141 10bd70d 3138->3141 3140->3140 3144 10bd720 3140->3144 3141->3140 3147 10bd7ae-10bd7b2 3142->3147 3148 10bd7bc 3142->3148 3143->3142 3144->3137 3147->3148 3149 10bd7b4 3147->3149 3150 10bd7bd 3148->3150 3149->3148 3150->3150
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 010BD762
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 3dba39052b203fdbdbdeebce3836b8312730c07652a090fb4108272745ff4ed5
                                            • Instruction ID: 5414eacfde17b47ccf1538df55496dc604919be0ac83a40e4804834781ff8602
                                            • Opcode Fuzzy Hash: 3dba39052b203fdbdbdeebce3836b8312730c07652a090fb4108272745ff4ed5
                                            • Instruction Fuzzy Hash: 063134B4D002899FDB14CFA9C8857DEFBF1BB08318F148529E855AB280E7789445CF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Clipboard
                                            • String ID:
                                            • API String ID: 220874293-0
                                            • Opcode ID: 63972fc393c13d9a05b196d82c48b6ebd6acabbb18c9d343bc1b48c68532c357
                                            • Instruction ID: d716539ee5e65859c0454b66049447d3fe7727ce43a914f273eb356324ccc3e9
                                            • Opcode Fuzzy Hash: 63972fc393c13d9a05b196d82c48b6ebd6acabbb18c9d343bc1b48c68532c357
                                            • Instruction Fuzzy Hash: 5731F2B0D40209DFDB50DF99C884BDEBBF5BB48318F148029E504AB390D7B4A989CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Clipboard
                                            • String ID:
                                            • API String ID: 220874293-0
                                            • Opcode ID: 6405de7977181761b5802aeb47c543038725ce90f15e44f21ddc18a137402b8f
                                            • Instruction ID: 54322f83e52e7d35b7274b6be8383d4f10443b11698012a1e4d4ace7b17af9d3
                                            • Opcode Fuzzy Hash: 6405de7977181761b5802aeb47c543038725ce90f15e44f21ddc18a137402b8f
                                            • Instruction Fuzzy Hash: 8B31D0B0D40209DFDB50CF98C985BDEBBF5BB48318F148419E504AB290D7749989CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,060FD2AE,?,?,?,?,?), ref: 060FD36F
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: bcf7799dfce97185c521ae498b0447db206b754ed7a651132b5353ead3e9d5cb
                                            • Instruction ID: f352be3b3dbcdd64d562367e3d86f3547ddabcb00bc7d05791a7df2d5d7d0e3c
                                            • Opcode Fuzzy Hash: bcf7799dfce97185c521ae498b0447db206b754ed7a651132b5353ead3e9d5cb
                                            • Instruction Fuzzy Hash: 0021E5B5D002089FDB50CF99D884ADEBBF5EB48324F14841AE915A7350D374A954CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,060FE567), ref: 060FE5FF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 6a16a0cea31d75979094c5b99a396c2ed4f219db5ae1b3b1cbb3157acfa6d0da
                                            • Instruction ID: f18c6c50cb404cdf496a9ae7c7d4bbfae7226936587d651d034ed15b5dc10646
                                            • Opcode Fuzzy Hash: 6a16a0cea31d75979094c5b99a396c2ed4f219db5ae1b3b1cbb3157acfa6d0da
                                            • Instruction Fuzzy Hash: 9A1176B9D003489FCB10DFA9D849BCEBBF4EB48324F14885AE519A7250C778A945CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 010B0B0E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocNumaVirtual
                                            • String ID:
                                            • API String ID: 4233825816-0
                                            • Opcode ID: b0981cd0797ba49d73ac2aaf8f1ccda82b205c9fdcb2585ef904f35d698a15c8
                                            • Instruction ID: 2f3070522011f74a965c5ae05f1a2b905ecdb2311d32a919b5363bc489234e87
                                            • Opcode Fuzzy Hash: b0981cd0797ba49d73ac2aaf8f1ccda82b205c9fdcb2585ef904f35d698a15c8
                                            • Instruction Fuzzy Hash: 1B2133719003499FCB10CFA9D884BDFBFF4EB88324F10881AE519A7260C3759954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,060FD2AE,?,?,?,?,?), ref: 060FD36F
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 7127559696a59c2e032365c99ab1f428ff343db21a46d583243ab964545b5dde
                                            • Instruction ID: b69a17e2f1b22a5a5deca134ac34bc449d745da8c74d18a14a9a4dd59373cba7
                                            • Opcode Fuzzy Hash: 7127559696a59c2e032365c99ab1f428ff343db21a46d583243ab964545b5dde
                                            • Instruction Fuzzy Hash: BF21B3B5D002089FDB10CFA9D984ADEBBF5EB48314F14841AE914A7250D374A954CF61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 010B583A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: 8de1897d4a93b09ccbdc79cb0ca8fb1dcc8ee66c52a69cecb8ae6fa73980d42b
                                            • Instruction ID: 93b4952ca8de0382af1019a3bb03e7cd9b73daee21e1de338187d05a21cae5b9
                                            • Opcode Fuzzy Hash: 8de1897d4a93b09ccbdc79cb0ca8fb1dcc8ee66c52a69cecb8ae6fa73980d42b
                                            • Instruction Fuzzy Hash: E821B8B58013458FCB10DFA9D8883DABFF4EB09314F14889AD444F7241C7386648CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 010B0B0E
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocNumaVirtual
                                            • String ID:
                                            • API String ID: 4233825816-0
                                            • Opcode ID: 60c8b7393bdbc22428824005ebc75b74aaeea747ecf163766def116b071b155e
                                            • Instruction ID: 370f81e7b545d93895e7fa72726ce18a94d5c21f14dc1180f7e4f5fd0cc0e27c
                                            • Opcode Fuzzy Hash: 60c8b7393bdbc22428824005ebc75b74aaeea747ecf163766def116b071b155e
                                            • Instruction Fuzzy Hash: 3C1123719006099FCB10DF9AD884BDFBBF5EB48324F108819E559B7250C375A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlEncodePointer.NTDLL(00000000), ref: 010B583A
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID:
                                            • API String ID: 2118026453-0
                                            • Opcode ID: 06ea086f184b4b66d00db077794e7d310421dffa1efecee0abea52f68b6241e3
                                            • Instruction ID: ef9a6f621801c2174886e524adadc2900569a37709c90adaf7586f2ffaf209be
                                            • Opcode Fuzzy Hash: 06ea086f184b4b66d00db077794e7d310421dffa1efecee0abea52f68b6241e3
                                            • Instruction Fuzzy Hash: D01197759003098FDB60DFAAD8487DEBBF4EB08314F248969D445F7640D738A648CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,060FE567), ref: 060FE5FF
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 094fba23d88d71e1029c6402119e70515c910df2ea1534f5f0ebfac08d9af139
                                            • Instruction ID: 0d0d5f804fb9a955348811be2f8fe8eeb616f80064567a8f14cb3fb81451f285
                                            • Opcode Fuzzy Hash: 094fba23d88d71e1029c6402119e70515c910df2ea1534f5f0ebfac08d9af139
                                            • Instruction Fuzzy Hash: C01125B19042099FCB50DF9AD84879EFBF4EB48324F10881AE619A7750D778A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 060FEF85
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: a4685e29194ec996126d3c4cee44bc12b00c9d21c67fd41630ca6ebdadb2fce9
                                            • Instruction ID: 56cfdb14f0ee7693d9542082778e7f9190e881103fcedcdc7a5d5865ae242234
                                            • Opcode Fuzzy Hash: a4685e29194ec996126d3c4cee44bc12b00c9d21c67fd41630ca6ebdadb2fce9
                                            • Instruction Fuzzy Hash: 3A1133B08443489FCB50DF99D844B9EBBF4EB48224F10881AE519A7640C374A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 060FEF85
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595301167.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_60f0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 1cf5835c4b664d1891c47bfc645294f2163ae53aac8b06e1419c3c0dd05b2dd1
                                            • Instruction ID: 1cb366d749c7db012b0e0c9f8f3cb03f838a5ccca846d2b7032d59f7bcf1ef68
                                            • Opcode Fuzzy Hash: 1cf5835c4b664d1891c47bfc645294f2163ae53aac8b06e1419c3c0dd05b2dd1
                                            • Instruction Fuzzy Hash: 841112B5C00748CFCB50DFA9D849BCEBBF4EB48324F14881AE519A7650C378A548CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 7bc71fb3dfe1ce605c79c3d7be453759e5519d751cc24dba4c39cecdb861e4cf
                                            • Instruction ID: 84d0bb5010ddd837c5722e1e3f2d819167cd0976cf11fa8c4f8f2027dda6131b
                                            • Opcode Fuzzy Hash: 7bc71fb3dfe1ce605c79c3d7be453759e5519d751cc24dba4c39cecdb861e4cf
                                            • Instruction Fuzzy Hash: E01100B08046498FDB20DF9AD888BDEFBF4EB48324F10845AE559A7340C774A944CFA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.591581077.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_10b0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 0442e9cdbc29eb0eec4f0c414be84a1dfa937ce999a1b2b3ded7af7c75dde619
                                            • Instruction ID: 7d8a6f94f1f20cdf5e7adef98438ecdff5a16c14c0de55f62282fb1ecb63909b
                                            • Opcode Fuzzy Hash: 0442e9cdbc29eb0eec4f0c414be84a1dfa937ce999a1b2b3ded7af7c75dde619
                                            • Instruction Fuzzy Hash: 8611F2B58006498FDB20DF9AD884BDEFBF4EB48324F14845AD559A7240C774A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a09a2acf0102504a8e7ea4d2627e4e2b2fd1ba9cb5179f4110173082a81ee11
                                            • Instruction ID: 732e5d9f7f5d14703f4d1e9df96b2019aaaa545fcdba7e4972b5d730234685f2
                                            • Opcode Fuzzy Hash: 1a09a2acf0102504a8e7ea4d2627e4e2b2fd1ba9cb5179f4110173082a81ee11
                                            • Instruction Fuzzy Hash: 6B324D74B002199FDB24AB64EC997AD77B6FF88300F5041AAD80AE3394DF315E858F59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6874e9483b1273743294612f44087b0b8e31ddd4892ed3455d980f6e3a3394f7
                                            • Instruction ID: f1bdc0b8167a3640f7b85fd50f9d85d3ad5ba3b9205cc6db110e7b309994cc55
                                            • Opcode Fuzzy Hash: 6874e9483b1273743294612f44087b0b8e31ddd4892ed3455d980f6e3a3394f7
                                            • Instruction Fuzzy Hash: 13D13975E002299FCB04CF68C985AADBBF2FF58314F16849AE515AB361C731EC81CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7265013ed8da76ee6bf66a4daf0af407df799c7a1eb1ec37a6dfb9fc7ededc7
                                            • Instruction ID: 48889ed37f6bf3016dcb65ba34cbbea1779dfe1be9e87eb5aff9f8add32336bc
                                            • Opcode Fuzzy Hash: b7265013ed8da76ee6bf66a4daf0af407df799c7a1eb1ec37a6dfb9fc7ededc7
                                            • Instruction Fuzzy Hash: 98C16930A14219AFCB14CF69D984EAEBBF2BF58318F15855AE909EB361D731EC41CB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4b4624d6cf2f1ecacc61b441030d2c3bcb2efcc779fe6ffe633d38ff853fed3
                                            • Instruction ID: 459401e042387e3c0af6124dcea64876e37948022dda954606003cf61edde26a
                                            • Opcode Fuzzy Hash: f4b4624d6cf2f1ecacc61b441030d2c3bcb2efcc779fe6ffe633d38ff853fed3
                                            • Instruction Fuzzy Hash: 4D91D571A04226EFCB14CF68C885E6EBBB1FF58314F06886AE9559B361D731EC41CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 493d9d1b39bce62255ce0e7de59d8f7005e8b8fc2ef1d1b33d12835491c7901b
                                            • Instruction ID: a0c910b9e257447cf52d342108e61201c09046106068631fd60fb27a0d8864fa
                                            • Opcode Fuzzy Hash: 493d9d1b39bce62255ce0e7de59d8f7005e8b8fc2ef1d1b33d12835491c7901b
                                            • Instruction Fuzzy Hash: 1871C1347042218FD728AB68C894A3EB7A7BFC8209F04847AE5568F795DF75DC418B91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f361b12da691ea4d71fc971330347915c815c3ab0aa321f090a1d11c53afc0a2
                                            • Instruction ID: a1f71521cccff4ec9a0e6b15b683ab79c57cb0da4b8f3608a95b3af0090c579b
                                            • Opcode Fuzzy Hash: f361b12da691ea4d71fc971330347915c815c3ab0aa321f090a1d11c53afc0a2
                                            • Instruction Fuzzy Hash: 0DA1CB34946328CFD765DB68D854ADC77B2BF8A30AF2080EAD54996300CB36DD86CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 58a5b2a4ee592a395e707c349dd3322208fa5adbb2ad05f42ba1644e2912096b
                                            • Instruction ID: 2cd0b4e02fc7fc5526f8ac44d14c814bae8d80ef4d2a2efae7457a9c56d95071
                                            • Opcode Fuzzy Hash: 58a5b2a4ee592a395e707c349dd3322208fa5adbb2ad05f42ba1644e2912096b
                                            • Instruction Fuzzy Hash: 7591BB34946328DFD765DB28D854ADC77B2BF8A30AF2080EAD54996300CB36DD86CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9c64c8762435ab2eecae736546e8df122814aa0bb9ac749e20922f1776bc2e5e
                                            • Instruction ID: 3439bfb60144e620139135b406a50bd45535721e5c8bf896425bf9c48ff5c6cd
                                            • Opcode Fuzzy Hash: 9c64c8762435ab2eecae736546e8df122814aa0bb9ac749e20922f1776bc2e5e
                                            • Instruction Fuzzy Hash: 9791BB34946328CFD765DB24D854ADC77B2BF8A30AF2080EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cde66d1540605f7309d8d70b162f242b1a9649bb065838336698f124c89cfb99
                                            • Instruction ID: ad02719aac6f3e51f9063b6690ad112f9670ac1ec97f876042602f58f179647e
                                            • Opcode Fuzzy Hash: cde66d1540605f7309d8d70b162f242b1a9649bb065838336698f124c89cfb99
                                            • Instruction Fuzzy Hash: 1251E3713042259FEB15CF24D888B7E7BE2FF98309F05892AE4568B390DB75D845CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: beb5dff17ea9595286daece609d7be321acf43fa05a4824f72881ca3f9891a81
                                            • Instruction ID: 6922e529c8d2f1b476b62000ffe1cb1337fbe55c664a3becac448bd73e891c07
                                            • Opcode Fuzzy Hash: beb5dff17ea9595286daece609d7be321acf43fa05a4824f72881ca3f9891a81
                                            • Instruction Fuzzy Hash: CF91AB34946329CFD764DB24D8946DC77B2BF8630AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 55f13b387f6cad1534677dd636fd05b0b1d7c0274bb27ca7cb613b0684379bee
                                            • Instruction ID: c9733d594110cce5e74237daec1d14e72b313e27851dfb32621f1bae9a076ffc
                                            • Opcode Fuzzy Hash: 55f13b387f6cad1534677dd636fd05b0b1d7c0274bb27ca7cb613b0684379bee
                                            • Instruction Fuzzy Hash: 9D81AB34946368CFD765DB28D8946DCB7B2BF8630AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 883aff48393ee6812de65d619d2b84c1227ace4b1bf654f0042d32bd87773992
                                            • Instruction ID: bb38b1088bcaf12a55e596e87ad5dc6f66fe6f11300beeafbe43f176f69fcce7
                                            • Opcode Fuzzy Hash: 883aff48393ee6812de65d619d2b84c1227ace4b1bf654f0042d32bd87773992
                                            • Instruction Fuzzy Hash: 8C517031318121DFD714EF39C884E6ABBEBBF5864871944BAF45ACB265DB31DC028B50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1fe5b83824cc3aaa5b97c7a453b015e4eacfdde992b87b49612c0cc88a984a06
                                            • Instruction ID: e1254e76a6491471d6866e49befbb48916a392352df4d00e11494c3c737a2d44
                                            • Opcode Fuzzy Hash: 1fe5b83824cc3aaa5b97c7a453b015e4eacfdde992b87b49612c0cc88a984a06
                                            • Instruction Fuzzy Hash: B181BB34946328CFD765DB25D8946DC77B2BF8A30AF1040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d6b3c4ad2b5a3a4505eb6fa64f4513103888d22881052e6c482b40a65bf8adf
                                            • Instruction ID: 717d7a9d7403b4664341da2d34e9e564e3bbb630ba8e4c1d1402d1ff9d64d8e5
                                            • Opcode Fuzzy Hash: 5d6b3c4ad2b5a3a4505eb6fa64f4513103888d22881052e6c482b40a65bf8adf
                                            • Instruction Fuzzy Hash: 5771BB34946329CFD765DB28D894ADD77B2BF8A30AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b3ceb1741c86b13ccf4b88c8a9f977774f943a6487110a0c26f54aed45aecc9
                                            • Instruction ID: 954994888d75603e1d9792b2c4f1951f3dec82eada8e00bd04b30fa4533187a6
                                            • Opcode Fuzzy Hash: 0b3ceb1741c86b13ccf4b88c8a9f977774f943a6487110a0c26f54aed45aecc9
                                            • Instruction Fuzzy Hash: F571BA34946329CFD765DB28D894ADD77B2BF8A30AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c56b26463acb537a6b6c13b04abe68efc9720c7547803c2fc68d613d0914429
                                            • Instruction ID: ba692e8a075208cf3a10b5078e7595332adeaeafb65c3f01fdd0501c8b7340ef
                                            • Opcode Fuzzy Hash: 0c56b26463acb537a6b6c13b04abe68efc9720c7547803c2fc68d613d0914429
                                            • Instruction Fuzzy Hash: 6061BB34946329CFD765DB28D8946DD77B2BF8630AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 519b974c31c09e2bb1c63048b46f7dcc9f457cf82f564b701c5e7f17238ab5b2
                                            • Instruction ID: 212acb09f663e57de99263806cde750658ed2b4bc60ad885b6ae3aea382f3065
                                            • Opcode Fuzzy Hash: 519b974c31c09e2bb1c63048b46f7dcc9f457cf82f564b701c5e7f17238ab5b2
                                            • Instruction Fuzzy Hash: 6E61BC34A46329CFD765DB28D8946DD77B2BF8A30AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed43e55ef0c831329be806413f3a89f2ff75e1eb9458971d29114db13844fdd5
                                            • Instruction ID: 183f38a5d661367d03849346e993d49cbcb0e94d3dad9a55cbe1c0178e899e80
                                            • Opcode Fuzzy Hash: ed43e55ef0c831329be806413f3a89f2ff75e1eb9458971d29114db13844fdd5
                                            • Instruction Fuzzy Hash: 6151BB34A46329CFD765DB28D8846DD77B2BF8630AF2080EAD54996300CB36DD86CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00655d251e20d8f07aea8e8700088b125d32397aa8674ec90e787bacb1d44ae4
                                            • Instruction ID: 7fd7ae067daf8a671d14fd699bc263a4c5919474d2e13196b5156d6ea3601ae8
                                            • Opcode Fuzzy Hash: 00655d251e20d8f07aea8e8700088b125d32397aa8674ec90e787bacb1d44ae4
                                            • Instruction Fuzzy Hash: 0551BB34A46329CFD764DB68D8846DD77B2BF8630AF2040EAD54996300CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 826be9f36df749b58e1eb2b121f7276d02fb990d1ccd1bd1bd35c018fcc8ab51
                                            • Instruction ID: 88e4a9e4ec01e489737249d52c77ea4d48df20bde44ad616072092550988f79c
                                            • Opcode Fuzzy Hash: 826be9f36df749b58e1eb2b121f7276d02fb990d1ccd1bd1bd35c018fcc8ab51
                                            • Instruction Fuzzy Hash: 9A41D23130421A9FDB069F64D851BBE3BA6FF58304F048427F905CB2A1CB75C8668BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8f70d669afbe20f45c6404f876451f1f904967c2e6c78ef660bb611616ba413
                                            • Instruction ID: b9f2dedb7a2feac104597070abb04523b46dccc8c98d43f18131f161339c4ba7
                                            • Opcode Fuzzy Hash: e8f70d669afbe20f45c6404f876451f1f904967c2e6c78ef660bb611616ba413
                                            • Instruction Fuzzy Hash: 7751CB34A46329CFD764DB68D8846DC77B2BF8630AF2080EAD54992300CB36DD82CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf286df5e4804abe0a42028a530c29b097fe19405ba98fb4e20a317062776319
                                            • Instruction ID: 1fc950e012f32aec5b7abe86703c1ec564f2d599b334661b5707278921a214cb
                                            • Opcode Fuzzy Hash: cf286df5e4804abe0a42028a530c29b097fe19405ba98fb4e20a317062776319
                                            • Instruction Fuzzy Hash: 5051CB34946369CFD765DB68D8846DC77B2BF8A30AF1080EAD54992300CB36DD82CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a6bbe18ee8e68a6b1ff7857af8805dc45910b594f57390a8d38899e10c466c7
                                            • Instruction ID: 09ec1525d071b60b0c3740f662419a23c4ec5d07cc9c8c9470ba07a1d96b68cb
                                            • Opcode Fuzzy Hash: 5a6bbe18ee8e68a6b1ff7857af8805dc45910b594f57390a8d38899e10c466c7
                                            • Instruction Fuzzy Hash: EF414C75604125DFCB15EF69D848A6A7BB6FF48315F11446AF916CB3A0CB34DC82CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af6430eb1fbeeb81ebdd05638855fd4f95fd3e19e3c1ac6fc943fbea3fdaf7db
                                            • Instruction ID: 3d44c7ee37b90e96c23f75a7f862201ea4cee62bb1643f3eea12ea466702eea7
                                            • Opcode Fuzzy Hash: af6430eb1fbeeb81ebdd05638855fd4f95fd3e19e3c1ac6fc943fbea3fdaf7db
                                            • Instruction Fuzzy Hash: CD41BA34946369CFD764DB68D8846DC77B2BF8630AF2080EAD50992340CB36DD86CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ca1d3de88994b05fd2778b351fb6f19ca5d4a1837652e626aff7f094526c80e4
                                            • Instruction ID: f0dcce6c2b2feaec46efad2a7cab36c057d7a8865e3158717d1d074d0e2ee1ee
                                            • Opcode Fuzzy Hash: ca1d3de88994b05fd2778b351fb6f19ca5d4a1837652e626aff7f094526c80e4
                                            • Instruction Fuzzy Hash: E031C1357042149FCB189B78D855BAE7BB7EF88210F148469E516EB394CF319C068BA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 07b0204c4f684e1ce73ae5d702fed958b57d28de390784f56f1e25e6a7f62e61
                                            • Instruction ID: e90ef3d46a65c8ced596e302ff873892a97528ff871e295d6c239377aa5e49de
                                            • Opcode Fuzzy Hash: 07b0204c4f684e1ce73ae5d702fed958b57d28de390784f56f1e25e6a7f62e61
                                            • Instruction Fuzzy Hash: 1D41BA34946369CBD764DB68D8856DC77B2BB8630AF2080EAD54992340CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 823b3c929008cd86a967aaa849a7aa4b9652d25af0ac61cbe3e8a2140dd662bf
                                            • Instruction ID: 8cc827f1390cfd49875864adac6eef51498e1ad55708f6bdf0450688aba9d744
                                            • Opcode Fuzzy Hash: 823b3c929008cd86a967aaa849a7aa4b9652d25af0ac61cbe3e8a2140dd662bf
                                            • Instruction Fuzzy Hash: 0A41BA34A46329CBD754DB68D8856DC77B2BB8630AF1080EAD50992340CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8bac20161cf0ad3db2d53f160dc6bd0586a8789be869a2459dde52eac194d6db
                                            • Instruction ID: 0a2822008cee7781040eb3dc1010f4cafddcd9343f65fab181be0908c6dfd071
                                            • Opcode Fuzzy Hash: 8bac20161cf0ad3db2d53f160dc6bd0586a8789be869a2459dde52eac194d6db
                                            • Instruction Fuzzy Hash: D421D3313042254BDB24763998B4E3926BBEFD411FB14407AD506CBBA5EF25CC039796
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf3b93cabe82df12b8032ce07e6a49c45daabc8cbe25ba99d923d6847591807a
                                            • Instruction ID: 99d13cb5511bb4f1c99ca51d61aba54708e999c34c0d128281d98356ae29efb8
                                            • Opcode Fuzzy Hash: bf3b93cabe82df12b8032ce07e6a49c45daabc8cbe25ba99d923d6847591807a
                                            • Instruction Fuzzy Hash: 9B21C5313042254BEB24762998B4A7A36BBEFD465FF14807AD506CBBA4DE35CC439385
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4085511ea9e77d235ab4a6b9c3adb11d7b27322d5294e7fe4179951858cf00d8
                                            • Instruction ID: 22c30b3582ee0d4b78730bb050431350c46cff7bce79ee7d2e70a49f9c82e93c
                                            • Opcode Fuzzy Hash: 4085511ea9e77d235ab4a6b9c3adb11d7b27322d5294e7fe4179951858cf00d8
                                            • Instruction Fuzzy Hash: C531DA34A46329CBD754DB78D885ADC77B2BB8630AF1080EAD50992340CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f81ce753a316e05879b09966abcf2bff53de2278612835a474de61e6a6bbea9
                                            • Instruction ID: 7cb4331db341ec256ba2fe017664bcfe97c13b6c82029927edc55a1b5b794539
                                            • Opcode Fuzzy Hash: 4f81ce753a316e05879b09966abcf2bff53de2278612835a474de61e6a6bbea9
                                            • Instruction Fuzzy Hash: 2321943170C6659FDB10EE299840E7B7BE7AB75248B0D4427F846C7644DB30C842C760
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ab3dc889e054fb30d8997b885a8e8a807d26b7e7d14b082dbefa63874904e79a
                                            • Instruction ID: d97f0238047a953dc93cec3a704577e6d0d37f6c465ea4eb7e17d2c659a68d2e
                                            • Opcode Fuzzy Hash: ab3dc889e054fb30d8997b885a8e8a807d26b7e7d14b082dbefa63874904e79a
                                            • Instruction Fuzzy Hash: B231A934A46329CBD754DB78D884ADC77B2BB9630AF2180AAD54992340CB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5ac223113d87f0f600bc2f2963478e89ccabc9d2fcfb05950652066b6c17659
                                            • Instruction ID: 26d7dc13d88204ce5d175c874f1727b81db8349a7e8e78663193fa2a765ee2f5
                                            • Opcode Fuzzy Hash: d5ac223113d87f0f600bc2f2963478e89ccabc9d2fcfb05950652066b6c17659
                                            • Instruction Fuzzy Hash: 9E119131B04370DBEF3441A8D845B7D3692FB6232CF140427FD66C6380E625C881CB9A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 41b8161b39aa783d1a3b946af5358878241ec8055ddaa82673d78be070cc2ad2
                                            • Instruction ID: 2bed3836635c9c51dd5a2565019f33337f85c5382facdad10140db65430a29b1
                                            • Opcode Fuzzy Hash: 41b8161b39aa783d1a3b946af5358878241ec8055ddaa82673d78be070cc2ad2
                                            • Instruction Fuzzy Hash: FF31CA34A46329CBD754DB78D8846DC77B2BB9630AF2140AAD54992340CF36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 99d793e01a2ff642e56a3549432bd41e21d6d2e3b9bd48e3e82623ab702696f7
                                            • Instruction ID: 7a71be6b4f61e35df17afb26b60c46595b9cada5fdc3af5f933c1fd53b6a048e
                                            • Opcode Fuzzy Hash: 99d793e01a2ff642e56a3549432bd41e21d6d2e3b9bd48e3e82623ab702696f7
                                            • Instruction Fuzzy Hash: 1821DB34A02329CBC754DB78D8846DC77B2BB9630AF2180AAD54992300CF36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 359883039c07568755ff79243464f5332726ba2e8fb40d21a94e02bf682f7930
                                            • Instruction ID: ad22d537301e95b3786314dc19263de9a791770848d78c3e40978e41d2812580
                                            • Opcode Fuzzy Hash: 359883039c07568755ff79243464f5332726ba2e8fb40d21a94e02bf682f7930
                                            • Instruction Fuzzy Hash: F111E3357016228FD728AA29C89493BB766FFC4259B08407BE81ADB790DF72DC01C7D1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9522bd4ab4aff0318e8d45e508620667a6fb11c32e032f10188dd07a433496da
                                            • Instruction ID: 0533a39bd4480cf9850e4c08c98863e5bbde1bcaa15dd0f66107939d056ff0b4
                                            • Opcode Fuzzy Hash: 9522bd4ab4aff0318e8d45e508620667a6fb11c32e032f10188dd07a433496da
                                            • Instruction Fuzzy Hash: 5D118136B00218AFDB14DE69D944BAEBBBAFF8C310F144169E916E7350CA31AC51CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3486ee58a8209f565f497596a1301eaae997d4bca4b4ee8812f0a02f9ef3de37
                                            • Instruction ID: 378c357d6739b892196ef8cc1c0fa3cf47d89d7feab8859e331dda65b7810268
                                            • Opcode Fuzzy Hash: 3486ee58a8209f565f497596a1301eaae997d4bca4b4ee8812f0a02f9ef3de37
                                            • Instruction Fuzzy Hash: 8301493130C2941FCB19527AA8696BBBFABDFDA210F09447BE146C7395DE348C4583B5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 809dc527680d5e9ac93f7ac8dbfe701475ed00500a3a7e5437c2b98179e46bf6
                                            • Instruction ID: 0053aa5c155b2d23d7419028f82746ff380a4dbf286bfde71b2964eba29a2110
                                            • Opcode Fuzzy Hash: 809dc527680d5e9ac93f7ac8dbfe701475ed00500a3a7e5437c2b98179e46bf6
                                            • Instruction Fuzzy Hash: C6118430704330CBEF3545A89459B7D2592F76632CF100427FD6BC6340D625C881CB9B
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9681d6e390d75adaa6475f427b9f86047ce2399b21f783290804393d60bb0a7
                                            • Instruction ID: 9b0e0fa657839a5aec863c1a5628032c8fe38869c4a3327d450250e58672699f
                                            • Opcode Fuzzy Hash: f9681d6e390d75adaa6475f427b9f86047ce2399b21f783290804393d60bb0a7
                                            • Instruction Fuzzy Hash: 6B21C935A01329CBC714EB78D8846DC77B2BB9630AF2180AAD54A92300CF36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 25e5d843e14ee386c1e7aab20e8276313fd3f56e00f00e8ca0ce71ffc6a459b0
                                            • Instruction ID: 3698597a6d0ddb3ff99969f2000e23edc6f6cb53397f28ac125955de02fce652
                                            • Opcode Fuzzy Hash: 25e5d843e14ee386c1e7aab20e8276313fd3f56e00f00e8ca0ce71ffc6a459b0
                                            • Instruction Fuzzy Hash: AC118275E0011ADFCB04DFA9D845AAEBBF9FB58200F10842BE525E3200D7748A15CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c4e98227b88fbfed466578494ba41711067dd722eeb53fb6b92b767ee77bf8c
                                            • Instruction ID: d6af441eb82523fbaa03e5ac4ec88e6c78abfccac6421700d25d86c33920f2ec
                                            • Opcode Fuzzy Hash: 0c4e98227b88fbfed466578494ba41711067dd722eeb53fb6b92b767ee77bf8c
                                            • Instruction Fuzzy Hash: 62111F34A4131ACBC714DB79D8456DC77B2AF85309F2040AAD50993700DF36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d973bb84d547616c6b951d045b5a7078d6b39eabd83376dad76db57fc0611cbb
                                            • Instruction ID: f93de9a4eff9aa73588cbad235cf1e81ccc96da8495f180fe9be71921b72a488
                                            • Opcode Fuzzy Hash: d973bb84d547616c6b951d045b5a7078d6b39eabd83376dad76db57fc0611cbb
                                            • Instruction Fuzzy Hash: 1501D632604129AFDB19CE559C00BEE3B6AEBC8350F148136F615D7290C672C9139BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6e15e0537aea2379c513f82c266e4687e0591ba904e333157939f720eb3fdf77
                                            • Instruction ID: 4b78d90051d479085cb63c55c1ba03b5e207c276fba44c352e34400e1b7973b3
                                            • Opcode Fuzzy Hash: 6e15e0537aea2379c513f82c266e4687e0591ba904e333157939f720eb3fdf77
                                            • Instruction Fuzzy Hash: D801F932B041296F9B19DE599C10AEF3BABFBC8750F14812AF515D7284DF72CD129BA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d4a892f7a22ef343c8be8f211696e85672ca975c5216cf81b7fc431e64b3409
                                            • Instruction ID: 860a4ed09fff4a955d43a4e90150394b42c3102cb2902e23bf7a6b9bdee31768
                                            • Opcode Fuzzy Hash: 5d4a892f7a22ef343c8be8f211696e85672ca975c5216cf81b7fc431e64b3409
                                            • Instruction Fuzzy Hash: 27111C34A4132ACBC764DB78D8846DC77B2AB85309F2140AAD10993700DF36DD86CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 88c79823ce7a437092bf60dc8aa6a6ba3317c05b9cb3f054962b81c4f8a4e22c
                                            • Instruction ID: d6a7c2a5f100383ffcaef56e8ee8896c9961edab0fdf0392f6180cac522c4d44
                                            • Opcode Fuzzy Hash: 88c79823ce7a437092bf60dc8aa6a6ba3317c05b9cb3f054962b81c4f8a4e22c
                                            • Instruction Fuzzy Hash: E3010835A4232ACBC724EB78D8856ED77B2AF95309F1040AAD509A3700DB36DD82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3ddf8cca9bf99a0d3a5c3486634fcea58c255fc2d7918740520b0d6ecd113eb
                                            • Instruction ID: 7ab69c13b6fc6de537f3254f593eaae133fa20413816816bad1ecb5e1728322d
                                            • Opcode Fuzzy Hash: e3ddf8cca9bf99a0d3a5c3486634fcea58c255fc2d7918740520b0d6ecd113eb
                                            • Instruction Fuzzy Hash: 91F01D35A4122ACBC724DB68D8806DC77B2BF95309F1040AAD10993700DB32DD82CF55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f97915339c63129ac097012724dcd217e5fb8543c9ca35919e9b5b66d6fcc854
                                            • Instruction ID: d46cffb79863b60318eed91213d31fbd58c9378e2650e56a2d904cff97f6791d
                                            • Opcode Fuzzy Hash: f97915339c63129ac097012724dcd217e5fb8543c9ca35919e9b5b66d6fcc854
                                            • Instruction Fuzzy Hash: ACF0DA35E01229CBDB10EB69E881ADCB7B5AF95315F1084EAD50EA2340DB329D82CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef148c6a3aa3f0a04f5114eddd6e07f68e7a39d34ecc61dabe4e688331341e09
                                            • Instruction ID: a446f90801028ff58e63ae693f839fe64b47b24182205b4de3a8fc696c0e98cb
                                            • Opcode Fuzzy Hash: ef148c6a3aa3f0a04f5114eddd6e07f68e7a39d34ecc61dabe4e688331341e09
                                            • Instruction Fuzzy Hash: 04E0ED35E012298BCB50EB68D8806DCB371EF45215F1084E6D10DA2240DF329D86CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e739a56cd4f6f3a0a720f0919138c3c868d5ff29f5d61bfe28293209526705ec
                                            • Instruction ID: 7319e813a75abf3d8f9230b53edaf25b41433d8728e9bf208d74fe74d0848529
                                            • Opcode Fuzzy Hash: e739a56cd4f6f3a0a720f0919138c3c868d5ff29f5d61bfe28293209526705ec
                                            • Instruction Fuzzy Hash: 6FC012343683094BCA84FB71F953525332AEAC52083408921D11D4A46ADFB455054B9A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 874d2c35811574b4a3668c356ed29c839bcaa5623ff8e20639a1e329886103e7
                                            • Instruction ID: 9ea2b2a4845d7be69b525ab81705ccdee35c5ef2778cb0f521e2a2242a1ff88c
                                            • Opcode Fuzzy Hash: 874d2c35811574b4a3668c356ed29c839bcaa5623ff8e20639a1e329886103e7
                                            • Instruction Fuzzy Hash: 93C012383683054BCA84FB71FA921693726EAC52083008A22D11D8A8AADFB585068B5A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.595048648.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_5d20000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ml$ml$ml$ml
                                            • API String ID: 0-2968258151
                                            • Opcode ID: f3d18f635660847e200536e0dbcd72c288ca879819e8ebd43e15bcc80a266224
                                            • Instruction ID: eb02c8ccbfcf5389d66d2f646d6ba3e49791bc34c58527b9ad70a8a6f61fb95b
                                            • Opcode Fuzzy Hash: f3d18f635660847e200536e0dbcd72c288ca879819e8ebd43e15bcc80a266224
                                            • Instruction Fuzzy Hash: C50192317104218FA7248A2CC441AAA73EAFFAA76831A40A7E007CF370DAB4EC418790
                                            Uniqueness

                                            Uniqueness Score: -1.00%