Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
Analysis ID:756005
MD5:d55d9c72b27c17af9a53847bec4dad00
SHA1:dbfa157d95af9d351b7051802e5e80a0a78daa05
SHA256:36143d6674053884d6bf2ce1e5bc8dd6f31b9d6b4d2fae272e37ac5649d00520
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"C2 url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentsendMessage?chat_id=document"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31109:$a3: MailAccountConfiguration
      • 0x31122:$a5: SmtpAccountConfiguration
      • 0x310e9:$a8: set_BindingAccountConfiguration
      • 0x30057:$a11: get_securityProfile
      • 0x2fef8:$a12: get_useSeparateFolderTree
      • 0x3184c:$a13: get_DnsResolver
      • 0x30307:$a14: get_archivingScope
      • 0x3012f:$a15: get_providerName
      • 0x32837:$a17: get_priority
      • 0x31e0b:$a18: get_advancedParameters
      • 0x31223:$a19: get_disabledByRestriction
      • 0x2fcce:$a20: get_LastAccessed
      • 0x303a1:$a21: get_avatarType
      • 0x31f22:$a22: get_signaturePresets
      • 0x309c8:$a23: get_enableLog
      • 0x301ac:$a26: set_accountName
      • 0x3236d:$a27: set_InternalServerPort
      • 0x2f63d:$a28: set_bindingConfigurationUID
      • 0x31ee8:$a29: set_IdnAddress
      • 0x326eb:$a30: set_GuidMasterKey
      • 0x30207:$a31: set_username
      00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_f2a90d14unknownunknown
      • 0x3dd4:$a: 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01
      00000000.00000002.364684955.000000000300C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 18 entries
        SourceRuleDescriptionAuthorStrings
        0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
            • 0x2efc4:$s1: get_kbok
            • 0x2f8f8:$s2: get_CHoo
            • 0x30553:$s3: set_passwordIsSet
            • 0x2edc8:$s4: get_enableLog
            • 0x33519:$s8: torbrowser
            • 0x31ef5:$s10: logins
            • 0x317c3:$s11: credential
            • 0x2e1bc:$g1: get_Clipboard
            • 0x2e1ca:$g2: get_Keyboard
            • 0x2e1d7:$g3: get_Password
            • 0x2f7a6:$g4: get_CtrlKeyDown
            • 0x2f7b6:$g5: get_ShiftKeyDown
            • 0x2f7c7:$g6: get_AltKeyDown
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
            • 0x2f509:$a3: MailAccountConfiguration
            • 0x2f522:$a5: SmtpAccountConfiguration
            • 0x2f4e9:$a8: set_BindingAccountConfiguration
            • 0x2e457:$a11: get_securityProfile
            • 0x2e2f8:$a12: get_useSeparateFolderTree
            • 0x2fc4c:$a13: get_DnsResolver
            • 0x2e707:$a14: get_archivingScope
            • 0x2e52f:$a15: get_providerName
            • 0x30c37:$a17: get_priority
            • 0x3020b:$a18: get_advancedParameters
            • 0x2f623:$a19: get_disabledByRestriction
            • 0x2e0ce:$a20: get_LastAccessed
            • 0x2e7a1:$a21: get_avatarType
            • 0x30322:$a22: get_signaturePresets
            • 0x2edc8:$a23: get_enableLog
            • 0x2e5ac:$a26: set_accountName
            • 0x3076d:$a27: set_InternalServerPort
            • 0x2da3d:$a28: set_bindingConfigurationUID
            • 0x302e8:$a29: set_IdnAddress
            • 0x30aeb:$a30: set_GuidMasterKey
            • 0x2e607:$a31: set_username
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackWindows_Trojan_AgentTesla_f2a90d14unknownunknown
            • 0x21d4:$a: 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01
            Click to see the 30 entries
            No Sigma rule has matched
            Timestamp:192.168.2.5149.154.167.220497094432851779 11/29/22-13:52:27.896928
            SID:2851779
            Source Port:49709
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeReversingLabs: Detection: 34%
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeVirustotal: Detection: 27%Perma Link
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeJoe Sandbox ML: detected
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentsendMessage?chat_id=document"}
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3096.1.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendMessage"}
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49709 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPE
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://UEYOBD.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588988783.00000000030AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.592198535.0000000006B10000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588649521.0000000003056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dv3SXfHRU1tFUjfcDW.net
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000003.325953219.00000000010EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com8
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentdocument-----
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownDNS traffic detected: queries for: api.telegram.org

            System Summary

            barindex
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d5072c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d32f5c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
            Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d5072c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d32f5c.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
            Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_00FDC1640_2_00FDC164
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_00FDE5B00_2_00FDE5B0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_00FDE5A10_2_00FDE5A1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD49480_2_02CD4948
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD493B0_2_02CD493B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_076100400_2_07610040
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_076100060_2_07610006
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_010819701_2_01081970
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108B9F01_2_0108B9F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_01085FDC1_2_01085FDC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108EBE01_2_0108EBE0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_01088E311_2_01088E31
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_01083EF81_2_01083EF8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_02D247A01_2_02D247A0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_02D23E581_2_02D23E58
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_02D247101_2_02D24710
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_02D247301_2_02D24730
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F875381_2_05F87538
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F894F81_2_05F894F8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F869201_2_05F86920
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F86C681_2_05F86C68
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_010800401_2_01080040
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejMwFIuasQmBRssQfxHWfZPad.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000000.316326791.00000000006F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXanU.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejMwFIuasQmBRssQfxHWfZPad.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.370119547.00000000073D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000000.357615147.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejMwFIuasQmBRssQfxHWfZPad.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.585579631.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeBinary or memory string: OriginalFilenameXanU.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeReversingLabs: Detection: 34%
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeVirustotal: Detection: 27%
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/0
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000000.316326791.00000000006F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000000.316326791.00000000006F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000000.316326791.00000000006F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588624388.0000000003051000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_00FDF972 pushad ; iretd 0_2_00FDF979
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD0365 push es; retf 0_2_02CD0366
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDA319 push esi; iretd 0_2_02CDA31A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDA31B push esi; iretd 0_2_02CDA322
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDA0F9 push ebp; iretd 0_2_02CDA0FA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDA188 push esi; iretd 0_2_02CDA18A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDA18B push esi; iretd 0_2_02CDA192
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDADEF pushad ; iretd 0_2_02CDADF2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD5478 push ecx; retf 0_2_02CD5486
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDF401 push ecx; ret 0_2_02CDF415
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CDBAE3 push 691402CFh; iretd 0_2_02CDBAEA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD3A40 push ds; iretd 0_2_02CD3A42
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD3A21 push ds; iretd 0_2_02CD3A22
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD9E89 push eax; iretd 0_2_02CD9E8A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD9E90 push eax; iretd 0_2_02CD9E92
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD9EB8 push esp; iretd 0_2_02CD9EBA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 0_2_02CD9EBB push esp; iretd 0_2_02CD9EC2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108DDF1 push FFFFFF83h; ret 1_2_0108DDF3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108D761 pushad ; iretd 1_2_0108D75D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108DEDF push FFFFFF83h; ret 1_2_0108DEE1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_0108D6E9 pushad ; iretd 1_2_0108D75D
            Source: initial sampleStatic PE information: section name: .text entropy: 7.661127653184342
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d5072c.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.2d32f5c.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.364684955.000000000300C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTR
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.364684955.000000000300C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.364684955.000000000300C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe TID: 4528Thread sleep time: -38122s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe TID: 4444Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe TID: 2248Thread sleep count: 32 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe TID: 2248Thread sleep time: -29514790517935264s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe TID: 2492Thread sleep count: 9856 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeWindow / User API: threadDelayed 9856Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeThread delayed: delay time: 38122Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586019812.0000000001272000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F8C720 KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,1_2_05F8C720
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeCode function: 1_2_05F8516C GetUserNameW,1_2_05F8516C

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: Yara matchFile source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.407e780.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3feb360.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.3f6cd88.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 5996, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe PID: 3096, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            Path Interception11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            211
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Credentials in Registry
            1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Data from Local System
            Automated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Account Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials1
            System Owner/User Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items3
            Software Packing
            DCSync114
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe34%ReversingLabsWin32.Trojan.AgentTesla
            SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe28%VirustotalBrowse
            SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            1.0.SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com80%URL Reputationsafe
            http://www.tiro.com80%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            https://api.telegram.org40%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            http://dv3SXfHRU1tFUjfcDW.net0%Avira URL Cloudsafe
            http://UEYOBD.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.telegram.org
            149.154.167.220
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://DynDns.comDynDNSSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.tiro.com8SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000003.325953219.00000000010EC000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.carterandcone.comlSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentdocument-----SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sajatypeworks.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org4SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://dv3SXfHRU1tFUjfcDW.netSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588649521.0000000003056000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fonts.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sandoll.co.krSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://api.telegram.orgSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588988783.00000000030AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.588915905.0000000003098000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.sakkal.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.368884338.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://UEYOBD.comSecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe, 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox Version:36.0.0 Rainbow Opal
                                              Analysis ID:756005
                                              Start date and time:2022-11-29 13:49:17 +01:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 9m 3s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:5
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@3/1@1/0
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 116
                                              • Number of non-executed functions: 5
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              TimeTypeDescription
                                              13:50:36API Interceptor630x Sleep call for process: SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe modified
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              api.telegram.orgscan Document_SA26844823746789e.PDF.htmlGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              Ziraat-bankasiSwiftMessaji2911202245344.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win32.PWSX-gen.7918.18477.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              AWB DHL 7214306201 Shipment.pdf (432).exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              IMG_2022028022-0120.vbsGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              hesaphareketi-01.pdf.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              PO.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              500 126.htmlGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              500 126.htmlGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              Carta de pago.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              INVOICE SHIPPING-PACKING LIST.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              FedEx Express AWB#53053232097Receipt.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              Rfq#Specification.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              SHIPPING INVOICE-PACKING LIST DOCS.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              IMG_202202811-0443.vbsGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              hesaphareketi-01.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              DHLDOCUMENTS27011222.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              Halkbank.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              Ziraat-bankasiSwiftMessaji2811202245678765.exeGet hashmaliciousBrowse
                                              • 149.154.167.220
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.654515371669624
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              File size:943616
                                              MD5:d55d9c72b27c17af9a53847bec4dad00
                                              SHA1:dbfa157d95af9d351b7051802e5e80a0a78daa05
                                              SHA256:36143d6674053884d6bf2ce1e5bc8dd6f31b9d6b4d2fae272e37ac5649d00520
                                              SHA512:e4be587979e4d0496ccbfe158fb4577b0cbdc8b28b938575a513e852232a2e055ad99f2c731d2aa3efe2fb86f36a9b03ee61a556e389467d316adeb4f33f2413
                                              SSDEEP:12288:e2UqU+5xyB55eq8/XzIutu3GpEqqJCLkLdVBm9DuN3TnQT8QzDdzoa1cfN:RIe7/st3cEqqgkZ/mINj0rDdEPf
                                              TLSH:2A15DF8073A6AF75F52967F32422810827B63C2EA5F1D2296DDDF0DE2572B5109F0B27
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~..c..............0..^..........Z}... ........@.. ....................................@................................
                                              Icon Hash:00828e8e8686b000
                                              Entrypoint:0x4e7d5a
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x6385B67E [Tue Nov 29 07:36:30 2022 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xe7d080x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x388.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xe5d600xe5e00False0.8267634414083741data7.661127653184342IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xe80000x3880x400False0.369140625data2.8500524693535905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xea0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xe80580x32cdata
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              192.168.2.5149.154.167.220497094432851779 11/29/22-13:52:27.896928TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49709443192.168.2.5149.154.167.220
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 29, 2022 13:52:27.724504948 CET5675153192.168.2.58.8.8.8
                                              Nov 29, 2022 13:52:27.741775990 CET53567518.8.8.8192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Nov 29, 2022 13:52:27.724504948 CET192.168.2.58.8.8.80x3a9Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Nov 29, 2022 13:52:27.741775990 CET8.8.8.8192.168.2.50x3a9No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:13:50:22
                                              Start date:29/11/2022
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              Imagebase:0x6f0000
                                              File size:943616 bytes
                                              MD5 hash:D55D9C72B27C17AF9A53847BEC4DAD00
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.364684955.000000000300C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000000.00000002.366653419.0000000003F6C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.361380481.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low

                                              Target ID:1
                                              Start time:13:50:41
                                              Start date:29/11/2022
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.23740.23288.exe
                                              Imagebase:0x980000
                                              File size:943616 bytes
                                              MD5 hash:D55D9C72B27C17AF9A53847BEC4DAD00
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000001.00000000.357382208.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000001.00000002.586418495.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:10.2%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:5%
                                                Total number of Nodes:222
                                                Total number of Limit Nodes:12
                                                execution_graph 28828 fdb8f8 DuplicateHandle 28829 fdb98e 28828->28829 28830 2cd4948 28831 2cd4972 28830->28831 28844 2cd437c 28831->28844 28834 2cd437c LoadLibraryExW 28835 2cd49d7 28834->28835 28848 2cd439c 28835->28848 28837 2cd4ac8 28852 2cd4640 28837->28852 28839 2cd4b24 28840 2cd439c LoadLibraryExW 28839->28840 28841 2cd4c80 28840->28841 28842 2cd4640 LoadLibraryExW 28841->28842 28843 2cd4cdc 28842->28843 28845 2cd4387 28844->28845 28856 2cd46f0 28845->28856 28847 2cd49ab 28847->28834 28849 2cd43a7 28848->28849 28974 2cdc418 28849->28974 28851 2cdd7f6 28851->28837 28853 2cd464b 28852->28853 28854 2cdc418 LoadLibraryExW 28853->28854 28855 2cdf48f 28854->28855 28855->28839 28857 2cd46fb 28856->28857 28861 fd5858 28857->28861 28869 fd7130 28857->28869 28858 2cd51e4 28858->28847 28862 fd5863 28861->28862 28864 fd73de 28862->28864 28877 2cd526f 28862->28877 28880 fd9198 28862->28880 28884 2cd5270 28862->28884 28863 fd741c 28863->28858 28864->28863 28887 fdb2f0 28864->28887 28870 fd7135 28869->28870 28872 fd73de 28870->28872 28873 2cd526f LoadLibraryExW 28870->28873 28874 fd9198 LoadLibraryExW 28870->28874 28875 2cd5270 LoadLibraryExW 28870->28875 28871 fd741c 28871->28858 28872->28871 28876 fdb2f0 LoadLibraryExW 28872->28876 28873->28872 28874->28872 28875->28872 28876->28871 28892 2cd52d7 28877->28892 28878 2cd527e 28878->28864 28918 fd91c1 28880->28918 28924 fd91d0 28880->28924 28881 fd91ae 28881->28864 28885 2cd527e 28884->28885 28886 2cd52d7 LoadLibraryExW 28884->28886 28885->28864 28886->28885 28888 fdb321 28887->28888 28889 fdb345 28888->28889 28928 fdb5a9 28888->28928 28933 fdb5b8 28888->28933 28889->28863 28896 fd92c8 28892->28896 28901 fd92b8 28892->28901 28893 2cd52e7 28893->28878 28897 fd92db 28896->28897 28898 fd92eb 28897->28898 28906 fd9958 28897->28906 28910 fd9948 28897->28910 28898->28893 28902 fd92db 28901->28902 28903 fd92eb 28902->28903 28904 fd9958 LoadLibraryExW 28902->28904 28905 fd9948 LoadLibraryExW 28902->28905 28903->28893 28904->28903 28905->28903 28907 fd996c 28906->28907 28909 fd9991 28907->28909 28914 fd94b8 28907->28914 28909->28898 28911 fd9958 28910->28911 28912 fd94b8 LoadLibraryExW 28911->28912 28913 fd9991 28911->28913 28912->28913 28913->28898 28915 fd9b38 LoadLibraryExW 28914->28915 28917 fd9bb1 28915->28917 28917->28909 28919 fd91ce 28918->28919 28920 fd9191 28918->28920 28922 fd92c8 LoadLibraryExW 28919->28922 28923 fd92b8 LoadLibraryExW 28919->28923 28920->28881 28921 fd91df 28921->28881 28922->28921 28923->28921 28926 fd92c8 LoadLibraryExW 28924->28926 28927 fd92b8 LoadLibraryExW 28924->28927 28925 fd91df 28925->28881 28926->28925 28927->28925 28929 fdb525 28928->28929 28930 fdb5b2 28928->28930 28931 fdb5ff 28930->28931 28937 fd97b8 28930->28937 28931->28889 28934 fdb5c5 28933->28934 28935 fdb5ff 28934->28935 28936 fd97b8 LoadLibraryExW 28934->28936 28935->28889 28936->28935 28938 fd97c3 28937->28938 28939 fdc2f8 28938->28939 28941 fd9880 28938->28941 28942 fd988b 28941->28942 28943 fd5858 LoadLibraryExW 28942->28943 28944 fdc367 28943->28944 28945 fdc375 28944->28945 28950 fdc3d0 28944->28950 28956 fde0e8 28945->28956 28962 fde0d8 28945->28962 28946 fdc3a0 28946->28939 28951 fdc383 28950->28951 28953 fdc3d6 28950->28953 28954 fde0e8 LoadLibraryExW 28951->28954 28955 fde0d8 LoadLibraryExW 28951->28955 28952 fdc3a0 28952->28945 28954->28952 28955->28952 28958 fde119 28956->28958 28959 fde165 28956->28959 28957 fde125 28957->28946 28958->28957 28967 fde568 28958->28967 28970 fde558 28958->28970 28959->28946 28963 fde0e8 28962->28963 28964 fde125 28963->28964 28965 fde568 LoadLibraryExW 28963->28965 28966 fde558 LoadLibraryExW 28963->28966 28964->28946 28965->28964 28966->28964 28968 fd92c8 LoadLibraryExW 28967->28968 28969 fde571 28968->28969 28969->28959 28971 fde568 28970->28971 28972 fd92c8 LoadLibraryExW 28971->28972 28973 fde571 28972->28973 28973->28959 28975 2cdc423 28974->28975 28976 2cdd8b0 28975->28976 28980 2cdd8cb 28975->28980 28984 2cdd8d0 28975->28984 28976->28851 28977 2cdd87a 28977->28851 28981 2cdd8d0 28980->28981 28983 2cdd995 28981->28983 28988 2cdc438 28981->28988 28983->28977 28985 2cdd8ff 28984->28985 28986 2cdc438 LoadLibraryExW 28985->28986 28987 2cdd995 28985->28987 28986->28987 28987->28977 28989 2cdc443 28988->28989 28991 2cd526f LoadLibraryExW 28989->28991 28992 2cd5270 LoadLibraryExW 28989->28992 28990 2cde17a 28990->28983 28991->28990 28992->28990 28993 fdfd38 28994 fdfda0 CreateWindowExW 28993->28994 28996 fdfe5c 28994->28996 28996->28996 29001 2cd0ca8 29002 2cd0cd5 29001->29002 29003 2cd0d07 29002->29003 29007 2cd0efc 29002->29007 29013 2cd0e30 29002->29013 29018 2cd0e20 29002->29018 29008 2cd0f0a 29007->29008 29009 2cd0eba 29007->29009 29023 2cd0ed8 29009->29023 29026 2cd0ee8 29009->29026 29010 2cd0ed0 29010->29003 29015 2cd0e44 29013->29015 29014 2cd0ed0 29014->29003 29016 2cd0ed8 2 API calls 29015->29016 29017 2cd0ee8 2 API calls 29015->29017 29016->29014 29017->29014 29020 2cd0e44 29018->29020 29019 2cd0ed0 29019->29003 29021 2cd0ed8 2 API calls 29020->29021 29022 2cd0ee8 2 API calls 29020->29022 29021->29019 29022->29019 29024 2cd0ef9 29023->29024 29029 2cd238b 29023->29029 29024->29010 29027 2cd0ef9 29026->29027 29028 2cd238b 2 API calls 29026->29028 29027->29010 29028->29027 29033 2cd23a0 29029->29033 29037 2cd23b0 29029->29037 29030 2cd239a 29030->29024 29034 2cd23f2 29033->29034 29036 2cd23f9 29033->29036 29035 2cd244a CallWindowProcW 29034->29035 29034->29036 29035->29036 29036->29030 29038 2cd23f2 29037->29038 29040 2cd23f9 29037->29040 29039 2cd244a CallWindowProcW 29038->29039 29038->29040 29039->29040 29040->29030 29094 7618158 29095 76182e3 29094->29095 29096 761817e 29094->29096 29096->29095 29100 2cd0006 SetWindowLongW 29096->29100 29102 2cd0040 SetWindowLongW 29096->29102 29104 76183d8 PostMessageW 29096->29104 29101 2cd00ac 29100->29101 29101->29096 29103 2cd00ac 29102->29103 29103->29096 29105 7618444 29104->29105 29105->29096 28997 fd98b0 28998 fd98f8 GetModuleHandleW 28997->28998 28999 fd98f2 28997->28999 29000 fd9925 28998->29000 28999->28998 29041 fd40d0 29042 fd40e2 29041->29042 29043 fd40ee 29042->29043 29048 fd4121 29042->29048 29053 fd41e0 29042->29053 29058 fd3c64 29043->29058 29045 fd410d 29050 fd412a 29048->29050 29062 fd42d1 29050->29062 29066 fd42e0 29050->29066 29054 fd4205 29053->29054 29056 fd42d1 CreateActCtxA 29054->29056 29057 fd42e0 CreateActCtxA 29054->29057 29055 fd420f 29055->29043 29056->29055 29057->29055 29059 fd3c6f 29058->29059 29074 fd51a4 29059->29074 29061 fd6a50 29061->29045 29063 fd42e0 29062->29063 29065 fd43e4 29063->29065 29070 fd3de4 29063->29070 29068 fd4307 29066->29068 29067 fd43e4 29068->29067 29069 fd3de4 CreateActCtxA 29068->29069 29069->29067 29071 fd5370 CreateActCtxA 29070->29071 29073 fd5433 29071->29073 29075 fd51af 29074->29075 29078 fd57f8 29075->29078 29077 fd6af5 29077->29061 29079 fd5803 29078->29079 29082 fd5828 29079->29082 29081 fd6bda 29081->29077 29083 fd5833 29082->29083 29084 fd5858 LoadLibraryExW 29083->29084 29085 fd6cca 29084->29085 29085->29081 29086 fdb6d0 GetCurrentProcess 29087 fdb74a GetCurrentThread 29086->29087 29088 fdb743 29086->29088 29089 fdb787 GetCurrentProcess 29087->29089 29090 fdb780 29087->29090 29088->29087 29093 fdb7bd 29089->29093 29090->29089 29091 fdb7e5 GetCurrentThreadId 29092 fdb816 29091->29092 29093->29091
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.361232665.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2cd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4805dae85b14c86f1c5fcd4a0f08f52079c9f8258a97c9b6152a0bd5cdfddd7
                                                • Instruction ID: 1d5fb7d3c12fb06aafe5a5dadfacaeac1742e5cbeffea47596c9af50484dcf26
                                                • Opcode Fuzzy Hash: b4805dae85b14c86f1c5fcd4a0f08f52079c9f8258a97c9b6152a0bd5cdfddd7
                                                • Instruction Fuzzy Hash: 1632C574A00218CFDB64DFA8C994B9DB7B2FF89300F1585A9D509AB365DB30AE85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.361232665.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2cd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a36fb9e855a3f2a37c8bda9266915679ad2c8963ce69144dae119bc3b40809c5
                                                • Instruction ID: 8a9a96dd238a3d0625f2b2a568e5ea977fe27128acc365fa6bad18d6c02313c6
                                                • Opcode Fuzzy Hash: a36fb9e855a3f2a37c8bda9266915679ad2c8963ce69144dae119bc3b40809c5
                                                • Instruction Fuzzy Hash: A432C574A00218CFDB64DFA8C994B9DB7B2FF89300F1585A9D509AB365DB30AE85CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00FDB730
                                                • GetCurrentThread.KERNEL32 ref: 00FDB76D
                                                • GetCurrentProcess.KERNEL32 ref: 00FDB7AA
                                                • GetCurrentThreadId.KERNEL32 ref: 00FDB803
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 58867b8ed41ce173e3e2c36415a73bf9aaa9d963168c3fa7929de5307dad26e5
                                                • Instruction ID: a6febc4dcab8d580bb56206712d445b1e885ead28b49ab0315cb8ac63f31f225
                                                • Opcode Fuzzy Hash: 58867b8ed41ce173e3e2c36415a73bf9aaa9d963168c3fa7929de5307dad26e5
                                                • Instruction Fuzzy Hash: 6F5157B0D00249CFDB10CFA9D588BDEBBF2AF88314F24856AE409A7751D774A884CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00FDB730
                                                • GetCurrentThread.KERNEL32 ref: 00FDB76D
                                                • GetCurrentProcess.KERNEL32 ref: 00FDB7AA
                                                • GetCurrentThreadId.KERNEL32 ref: 00FDB803
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: a7b214252380348de7db505a9126a300a1003d96f6b8b533cb6cb5405ee5e9e5
                                                • Instruction ID: f8d4f39d4907f9b593da813d0f4cca9b92186e893c85f7515919708a117e7256
                                                • Opcode Fuzzy Hash: a7b214252380348de7db505a9126a300a1003d96f6b8b533cb6cb5405ee5e9e5
                                                • Instruction Fuzzy Hash: 7A5145B0D00249CFDB20CFA9D548BDEBBF2AF88314F24856AE409A7751D774A984CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 53 fdfd38-fdfd9e 54 fdfda9-fdfdb0 53->54 55 fdfda0-fdfda6 53->55 56 fdfdbb-fdfe5a CreateWindowExW 54->56 57 fdfdb2-fdfdb8 54->57 55->54 59 fdfe5c-fdfe62 56->59 60 fdfe63-fdfe9b 56->60 57->56 59->60 64 fdfe9d-fdfea0 60->64 65 fdfea8 60->65 64->65 66 fdfea9 65->66 66->66
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00FDFE4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: cf59a12d01ef20250d13fd5236f9bff769b314588c5ab5addffafa228200dff1
                                                • Instruction ID: 7e97609ceb27777ad624b4226dc68b0a9904b1c882dbd7876b8fda06237d0e86
                                                • Opcode Fuzzy Hash: cf59a12d01ef20250d13fd5236f9bff769b314588c5ab5addffafa228200dff1
                                                • Instruction Fuzzy Hash: BF41B2B1D003099FDF14CF99C984ADEBBB6BF88314F24852AE819AB351D7749985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 39 fdfd37-fdfd9e 40 fdfda9-fdfdb0 39->40 41 fdfda0-fdfda6 39->41 42 fdfdbb-fdfdf3 40->42 43 fdfdb2-fdfdb8 40->43 41->40 44 fdfdfb-fdfe5a CreateWindowExW 42->44 43->42 45 fdfe5c-fdfe62 44->45 46 fdfe63-fdfe9b 44->46 45->46 50 fdfe9d-fdfea0 46->50 51 fdfea8 46->51 50->51 52 fdfea9 51->52 52->52
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00FDFE4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: ba5617aed858854ba2da88c03d40f150dcef35ffa133c395a5070715f259f926
                                                • Instruction ID: 5013f4c63beee044e044f0e46dcd6b335f19cfd4ca8a2bf23e94ad499c14eec3
                                                • Opcode Fuzzy Hash: ba5617aed858854ba2da88c03d40f150dcef35ffa133c395a5070715f259f926
                                                • Instruction Fuzzy Hash: E741C2B1D003099FDF14CFA9C984ADEBBB2BF88314F24852AE419AB311D7749845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 67 fd5364-fd5431 CreateActCtxA 69 fd543a-fd5494 67->69 70 fd5433-fd5439 67->70 77 fd5496-fd5499 69->77 78 fd54a3-fd54a7 69->78 70->69 77->78 79 fd54a9-fd54b5 78->79 80 fd54b8 78->80 79->80 81 fd54b9 80->81 81->81
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00FD5421
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: d288ddc75dc39ce4977c75f1868efaec11263be5ed51e39618c81a251c94a230
                                                • Instruction ID: b74c906246d470afcce6692311d1883aba565742009600777b442a09d89252e3
                                                • Opcode Fuzzy Hash: d288ddc75dc39ce4977c75f1868efaec11263be5ed51e39618c81a251c94a230
                                                • Instruction Fuzzy Hash: 96412471C00618CFDB20CFA9C9847DEBBB5BF49304F64816AD408AB351DB75598ACF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 83 fd3de4-fd5431 CreateActCtxA 86 fd543a-fd5494 83->86 87 fd5433-fd5439 83->87 94 fd5496-fd5499 86->94 95 fd54a3-fd54a7 86->95 87->86 94->95 96 fd54a9-fd54b5 95->96 97 fd54b8 95->97 96->97 98 fd54b9 97->98 98->98
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00FD5421
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: b809bbdc8c16ec74d7673971d92784adc2b1a6cf1d6cbebb68031ae25d877501
                                                • Instruction ID: 79beb3aef57cf0b0c98447c29d2f001d8f07e292df95e627d8cbd18dcf391481
                                                • Opcode Fuzzy Hash: b809bbdc8c16ec74d7673971d92784adc2b1a6cf1d6cbebb68031ae25d877501
                                                • Instruction Fuzzy Hash: 2B411471D00618CFDB20DFA9C9447DEBBB6BF49308F64816AD408AB351DBB16989CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 100 2cd23b0-2cd23ec 101 2cd249c-2cd24bc 100->101 102 2cd23f2-2cd23f7 100->102 109 2cd24bf-2cd24cc 101->109 103 2cd23f9-2cd2430 102->103 104 2cd244a-2cd2482 CallWindowProcW 102->104 110 2cd2439-2cd2448 103->110 111 2cd2432-2cd2438 103->111 106 2cd248b-2cd249a 104->106 107 2cd2484-2cd248a 104->107 106->109 107->106 110->109 111->110
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 02CD2471
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.361232665.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2cd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 71db448ecb36e0da8970d16a3194b063ae97ca4da62d91adc156b0fb7d160265
                                                • Instruction ID: 996a56da76fa8efd9c076c0316f3f744af765bddf72e06c0156dcfa67044dffe
                                                • Opcode Fuzzy Hash: 71db448ecb36e0da8970d16a3194b063ae97ca4da62d91adc156b0fb7d160265
                                                • Instruction Fuzzy Hash: 1F413AB4A003058FCB14CF99C448BAABBF5FF88314F15C559E919AB321D774A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 114 2cd0006-2cd00aa SetWindowLongW 115 2cd00ac-2cd00b2 114->115 116 2cd00b3-2cd00c7 114->116 115->116
                                                APIs
                                                • SetWindowLongW.USER32(?,?,?), ref: 02CD009D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.361232665.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2cd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: LongWindow
                                                • String ID:
                                                • API String ID: 1378638983-0
                                                • Opcode ID: 178bc5dea2ecc7be2dcf91ea7f73969308e2c42e47d978354e938fd02cec95bd
                                                • Instruction ID: 9603e184f86a5273a3b58dbbe28a298b594c91dc70fdf296dcb919d1c146ffa8
                                                • Opcode Fuzzy Hash: 178bc5dea2ecc7be2dcf91ea7f73969308e2c42e47d978354e938fd02cec95bd
                                                • Instruction Fuzzy Hash: 1421F2B08043888FDB12CFA9C4957EEBFF4EF4A320F05849AC844A7252C3786805CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 118 fdb8f2-fdb8f5 119 fdb8f8-fdb98c DuplicateHandle 118->119 120 fdb98e-fdb994 119->120 121 fdb995-fdb9b2 119->121 120->121
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FDB97F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: fe2cc4d83ee99244a05eead7ba22cd24737d71fcadea9b07a3cd9c8d5ff84e81
                                                • Instruction ID: dd0ba4472686d6271a22e4704c69840e5947fcb786376baca7fae13090372b35
                                                • Opcode Fuzzy Hash: fe2cc4d83ee99244a05eead7ba22cd24737d71fcadea9b07a3cd9c8d5ff84e81
                                                • Instruction Fuzzy Hash: 5821F2B5900259DFCF10CF99D984ADEFBF5EB48320F14842AE914A7710D374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 124 fdb8f8-fdb98c DuplicateHandle 125 fdb98e-fdb994 124->125 126 fdb995-fdb9b2 124->126 125->126
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FDB97F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 9ed44e206b10494f71fa9994e9f69ade1368015852a2a7512f05e87fb8f87d19
                                                • Instruction ID: 332b40aa8a66effa89f0d30e6fb525a49f7a820c50b2fc54dbb8ac8eb5ee1f24
                                                • Opcode Fuzzy Hash: 9ed44e206b10494f71fa9994e9f69ade1368015852a2a7512f05e87fb8f87d19
                                                • Instruction Fuzzy Hash: 1E21E2B5D002489FDF10CFAAD984ADEBBF9EB48324F14842AE914A7750D374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 129 fd9b30-fd9b78 131 fd9b7a-fd9b7d 129->131 132 fd9b80-fd9baf LoadLibraryExW 129->132 131->132 133 fd9bb8-fd9bd5 132->133 134 fd9bb1-fd9bb7 132->134 134->133
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FD9991,00000800,00000000,00000000), ref: 00FD9BA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 02c4c43ed574f6f89ed8c6f9a1a90285f64cf9e7ac6f5f51db7ae9f08f4803ed
                                                • Instruction ID: dab577f1d5d694166e1744414c1484f2db860690cec5ab22b5745b114f79af7f
                                                • Opcode Fuzzy Hash: 02c4c43ed574f6f89ed8c6f9a1a90285f64cf9e7ac6f5f51db7ae9f08f4803ed
                                                • Instruction Fuzzy Hash: E42117B6D002098FDB20CF9AD444ADEFBF5EF88364F14842AD415A7700D3B5A949CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 137 fd94b8-fd9b78 139 fd9b7a-fd9b7d 137->139 140 fd9b80-fd9baf LoadLibraryExW 137->140 139->140 141 fd9bb8-fd9bd5 140->141 142 fd9bb1-fd9bb7 140->142 142->141
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FD9991,00000800,00000000,00000000), ref: 00FD9BA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 9d6f8621085e5007f8d03434d48a63831ae608698ff82ff244340ea19c1271c3
                                                • Instruction ID: 0ae05228aa76aa832d91b04c12860147ffc903d501114da7824208531a4abc27
                                                • Opcode Fuzzy Hash: 9d6f8621085e5007f8d03434d48a63831ae608698ff82ff244340ea19c1271c3
                                                • Instruction Fuzzy Hash: 8D1103B69042488FCB20CF9AD444ADEFBF5AB88324F15842AD819A7700C3B5A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 145 fd98a8-fd98f0 147 fd98f8-fd9923 GetModuleHandleW 145->147 148 fd98f2-fd98f5 145->148 149 fd992c-fd9940 147->149 150 fd9925-fd992b 147->150 148->147 150->149
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00FD9916
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: ba45ee652c17a5692a768e7125394f707f2dd49538b2097e6e7f22e8ab5edcda
                                                • Instruction ID: 25993bac1db8a99bdc15fcdc0bc1907fefd98c7bd1c34157e8761e7b663e08c6
                                                • Opcode Fuzzy Hash: ba45ee652c17a5692a768e7125394f707f2dd49538b2097e6e7f22e8ab5edcda
                                                • Instruction Fuzzy Hash: CC11F3B6D002498FCB20CF9AC484ADEFBF5EF89324F14856AD459A7700D375A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 152 fd98b0-fd98f0 153 fd98f8-fd9923 GetModuleHandleW 152->153 154 fd98f2-fd98f5 152->154 155 fd992c-fd9940 153->155 156 fd9925-fd992b 153->156 154->153 156->155
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00FD9916
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 8a39fea31733971f97ff791605ab15bfc9aa111ba758deefe4183a9198fb199d
                                                • Instruction ID: 17f95bcf1f4b0329234da1c0bceea2f1d5b9ff9be3933cea756697bd350dd015
                                                • Opcode Fuzzy Hash: 8a39fea31733971f97ff791605ab15bfc9aa111ba758deefe4183a9198fb199d
                                                • Instruction Fuzzy Hash: 891102B6D002498FCB20CF9AC444ADEFBF5EB89324F14842AD419B7700C3B4A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 158 2cd0040-2cd00aa SetWindowLongW 159 2cd00ac-2cd00b2 158->159 160 2cd00b3-2cd00c7 158->160 159->160
                                                APIs
                                                • SetWindowLongW.USER32(?,?,?), ref: 02CD009D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.361232665.0000000002CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2cd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: LongWindow
                                                • String ID:
                                                • API String ID: 1378638983-0
                                                • Opcode ID: a091f2d9fdb650957df36b85a4f3515c31912a50bd50d923350c013a3a4a1155
                                                • Instruction ID: 4d61bbe9207781029c0afe6cf0e67d2bd0457cbfc7244f32d35c5c82851ddd15
                                                • Opcode Fuzzy Hash: a091f2d9fdb650957df36b85a4f3515c31912a50bd50d923350c013a3a4a1155
                                                • Instruction Fuzzy Hash: 6C11E2B59002499FDB20DF9AD585BEFBBF8EB88324F14841AD915A7740C374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 07618435
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.370826515.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7610000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: c6b4dc1a76fdf9b6d4d3aedbadfaee534827c0fec122565db2777976db56e29e
                                                • Instruction ID: 0d325e416e6ce87acb12cae48869a04c6e5d09b65cfcc38d590465f9dcaa2113
                                                • Opcode Fuzzy Hash: c6b4dc1a76fdf9b6d4d3aedbadfaee534827c0fec122565db2777976db56e29e
                                                • Instruction Fuzzy Hash: F811E5B58003499FDB20CF99D585BDEBBF8EB48324F148819D855A7700C374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.370826515.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7610000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: K$~
                                                • API String ID: 0-3319465646
                                                • Opcode ID: 82b7f09dd74453c2abf279ea175ccbb6c3dada2990b7abf2d1ab241e62ca290b
                                                • Instruction ID: 47267fbd7cb25617090330107e1217bea8117ec65474ed9b0bf6ff3e9b4a7fbb
                                                • Opcode Fuzzy Hash: 82b7f09dd74453c2abf279ea175ccbb6c3dada2990b7abf2d1ab241e62ca290b
                                                • Instruction Fuzzy Hash: 794144B1D05A588BEB5CCF6B8C4529AFAF7BFC9301F18C1B9880DA6254EB3405868F11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.370826515.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7610000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ~
                                                • API String ID: 0-1707062198
                                                • Opcode ID: add2661952ea191820e312d30898f86bd6c36f19d415c5095340f69c5f9bcf94
                                                • Instruction ID: 594ff592a3097c9b0a784a00bbe823ed6be8b5b44100960789fd8167e33e141c
                                                • Opcode Fuzzy Hash: add2661952ea191820e312d30898f86bd6c36f19d415c5095340f69c5f9bcf94
                                                • Instruction Fuzzy Hash: A4419171D05B588FEB59CF678D0128AFAF3AFC9211F18C1B6C44CAA265EB3405468F11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26218f9456e0d4d6f5592370e9b3409717452008e40dc00853b4231f60ddf75b
                                                • Instruction ID: 90f03347412173a97cbc348c0921ef06da075e79464c42f531793243443b2e52
                                                • Opcode Fuzzy Hash: 26218f9456e0d4d6f5592370e9b3409717452008e40dc00853b4231f60ddf75b
                                                • Instruction Fuzzy Hash: A312C3F1CE17468AD330CF65E9881893BB1F7C53A8BD04A19D2716BAD4D7B811AACF44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c0c58f75f94544b3dcbc2cc4b4391d022fec2cd165212b8a025afd5fa67d0287
                                                • Instruction ID: d91a1ba42ab094ede0a5c9893fba2de5d14f5df30f39c4bc2a4894684007149b
                                                • Opcode Fuzzy Hash: c0c58f75f94544b3dcbc2cc4b4391d022fec2cd165212b8a025afd5fa67d0287
                                                • Instruction Fuzzy Hash: 32A16E32E0021A8FCF05DFA5C8445DEBBB3FF85311B19856AE805BB361EB35A955DB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.360006081.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6800aba940686b4037eb2f8108b65dbdc1bbcf3fef9af52c7b5bf93f45d9f93
                                                • Instruction ID: a6f24b0d76fb6c371a86ececa110e17d8c847ea090095e996f1e2a582a359abf
                                                • Opcode Fuzzy Hash: c6800aba940686b4037eb2f8108b65dbdc1bbcf3fef9af52c7b5bf93f45d9f93
                                                • Instruction Fuzzy Hash: C1C136F1CE17468BD320CF65E9881893B71FBC53A8FD04A19D2616B6D4D7B811AACF84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:22.1%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:86
                                                Total number of Limit Nodes:5
                                                execution_graph 46150 2d25190 46151 2d251f8 CreateWindowExW 46150->46151 46153 2d252b4 46151->46153 46153->46153 46154 2d26b50 GetCurrentProcess 46155 2d26bc3 46154->46155 46156 2d26bca GetCurrentThread 46154->46156 46155->46156 46157 2d26c07 GetCurrentProcess 46156->46157 46158 2d26c00 46156->46158 46161 2d26c3d 46157->46161 46158->46157 46159 2d26c65 GetCurrentThreadId 46160 2d26c96 46159->46160 46161->46159 46162 2d2bc40 46163 2d2bc54 46162->46163 46166 2d2be8a 46163->46166 46172 2d2bf70 46166->46172 46177 2d2c06c 46166->46177 46182 2d2c086 46166->46182 46187 2d2bf60 46166->46187 46173 2d2bfb4 46172->46173 46174 2d2c0ab 46173->46174 46192 2d2c3b9 46173->46192 46200 2d2c368 46173->46200 46178 2d2c01f 46177->46178 46178->46177 46179 2d2c0ab 46178->46179 46180 2d2c368 2 API calls 46178->46180 46181 2d2c3b9 2 API calls 46178->46181 46180->46179 46181->46179 46183 2d2c099 46182->46183 46184 2d2c0ab 46182->46184 46185 2d2c368 2 API calls 46183->46185 46186 2d2c3b9 2 API calls 46183->46186 46185->46184 46186->46184 46188 2d2bf70 46187->46188 46189 2d2c0ab 46188->46189 46190 2d2c368 2 API calls 46188->46190 46191 2d2c3b9 2 API calls 46188->46191 46190->46189 46191->46189 46193 2d2c362 46192->46193 46195 2d2c3c2 46192->46195 46199 2d2c3b9 RtlEncodePointer 46193->46199 46205 2d2c3c8 46193->46205 46194 2d2c396 46194->46174 46196 2d2c42c RtlEncodePointer 46195->46196 46197 2d2c455 46195->46197 46196->46197 46197->46174 46199->46194 46201 2d2c386 46200->46201 46203 2d2c3c8 RtlEncodePointer 46201->46203 46204 2d2c3b9 2 API calls 46201->46204 46202 2d2c396 46202->46174 46203->46202 46204->46202 46206 2d2c402 46205->46206 46207 2d2c42c RtlEncodePointer 46206->46207 46208 2d2c455 46206->46208 46207->46208 46208->46194 46252 2d26d78 DuplicateHandle 46253 2d26e0e 46252->46253 46209 102d01c 46210 102d034 46209->46210 46211 102d08e 46210->46211 46216 2d27961 46210->46216 46224 2d25338 46210->46224 46228 2d25348 46210->46228 46232 2d23ca4 46210->46232 46217 2d279b5 46216->46217 46218 2d279e9 46217->46218 46220 2d279d9 46217->46220 46221 2d279e7 46218->46221 46248 2d26964 46218->46248 46240 2d27b10 46220->46240 46244 2d27b00 46220->46244 46225 2d2536e 46224->46225 46226 2d23ca4 CallWindowProcW 46225->46226 46227 2d2538f 46226->46227 46227->46211 46229 2d2536e 46228->46229 46230 2d23ca4 CallWindowProcW 46229->46230 46231 2d2538f 46230->46231 46231->46211 46233 2d23caf 46232->46233 46234 2d279e9 46233->46234 46236 2d279d9 46233->46236 46235 2d26964 CallWindowProcW 46234->46235 46237 2d279e7 46234->46237 46235->46237 46238 2d27b10 CallWindowProcW 46236->46238 46239 2d27b00 CallWindowProcW 46236->46239 46238->46237 46239->46237 46242 2d27b1e 46240->46242 46241 2d26964 CallWindowProcW 46241->46242 46242->46241 46243 2d27c0b 46242->46243 46243->46221 46245 2d27b05 46244->46245 46246 2d26964 CallWindowProcW 46245->46246 46247 2d27c0b 46245->46247 46246->46245 46247->46221 46249 2d2696f 46248->46249 46250 2d27cda CallWindowProcW 46249->46250 46251 2d27c89 46249->46251 46250->46251 46251->46221

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 40 5f8c720-5f8ca9c KiUserExceptionDispatcher 412 5f8ca9c call 1080040 40->412 413 5f8ca9c call 1080011 40->413 414 5f8ca9c call 1081347 40->414 80 5f8caa2-5f8cb95 415 5f8cb95 call 10829e8 80->415 416 5f8cb95 call 1082ce8 80->416 417 5f8cb95 call 1082f68 80->417 418 5f8cb95 call 1082e28 80->418 419 5f8cb95 call 1082ec8 80->419 420 5f8cb95 call 108182c 80->420 421 5f8cb95 call 10829e0 80->421 422 5f8cb95 call 1082b58 80->422 423 5f8cb95 call 1082bf8 80->423 424 5f8cb95 call 1082dd8 80->424 425 5f8cb95 call 1082c98 80->425 426 5f8cb95 call 1081918 80->426 427 5f8cb95 call 1082a5f 80->427 428 5f8cb95 call 108301f 80->428 429 5f8cb95 call 1082990 80->429 430 5f8cb95 call 1081970 80->430 431 5f8cb95 call 10818d0 80->431 432 5f8cb95 call 1081d70 80->432 92 5f8cb9b-5f8cbda 433 5f8cbda call 1083080 92->433 434 5f8cbda call 10830e0 92->434 95 5f8cbe0-5f8cc1f 435 5f8cc1f call 1083898 95->435 436 5f8cc1f call 10838a8 95->436 98 5f8cc25-5f8cc64 437 5f8cc64 call 1083b98 98->437 438 5f8cc64 call 1083ba8 98->438 101 5f8cc6a-5f8ccee 439 5f8ccee call 10844e8 101->439 440 5f8ccee call 1084489 101->440 107 5f8ccf4-5f8cd78 441 5f8cd78 call 1084a5a 107->441 442 5f8cd78 call 1084910 107->442 443 5f8cd78 call 10848b1 107->443 444 5f8cd78 call 1084c24 107->444 445 5f8cd78 call 1084d87 107->445 113 5f8cd7e-5f8ce02 446 5f8ce02 call 10856a8 113->446 447 5f8ce02 call 1085707 113->447 448 5f8ce02 call 1085647 113->448 119 5f8ce08-5f8ce8c 399 5f8ce8c call 1085b88 119->399 400 5f8ce8c call 1085b29 119->400 401 5f8ce8c call 1085be7 119->401 125 5f8ce92-5f8ced4 402 5f8ced4 call 1085ca8 125->402 403 5f8ced4 call 1085c49 125->403 404 5f8ced4 call 1085f40 125->404 405 5f8ced4 call 1085f94 125->405 128 5f8ceda-5f8cf10 406 5f8cf10 call 108e639 128->406 407 5f8cf10 call 108ebe0 128->407 131 5f8cf16-5f8cfd7 408 5f8cfdd call 108fded 131->408 409 5f8cfdd call 108fc80 131->409 410 5f8cfdd call 108fd11 131->410 411 5f8cfdd call 108fbd4 131->411 141 5f8cfe3-5f8d131 LdrInitializeThunk 162 5f8d453-5f8d781 KiUserExceptionDispatcher 141->162 163 5f8d137-5f8d15b 141->163 260 5f8d787-5f8d8ab 162->260 169 5f8d161 163->169 170 5f8d2b4-5f8d2d8 163->170 169->170 171 5f8d167-5f8d2af 169->171 178 5f8d2da 170->178 179 5f8d2de-5f8d2e0 170->179 171->162 181 5f8d2dc 178->181 182 5f8d2e2 178->182 183 5f8d2e7-5f8d311 179->183 181->179 182->183 192 5f8d313 183->192 193 5f8d317-5f8d319 183->193 194 5f8d31b 192->194 195 5f8d315 192->195 196 5f8d320-5f8d326 193->196 194->196 195->193 196->162 199 5f8d32c-5f8d42a 196->199 199->162 272 5f8db9f-5f8dbb0 260->272 273 5f8d8b1-5f8d8d4 260->273 276 5f8df0a-5f8df11 272->276 277 5f8dbb6-5f8dbbd 272->277 285 5f8d8da-5f8d94c 273->285 286 5f8db87-5f8db9c 273->286 278 5f8df93-5f8dfae 276->278 279 5f8df17-5f8df88 276->279 281 5f8dbc3-5f8dc23 277->281 282 5f8dc54-5f8dc5b 277->282 279->278 281->276 283 5f8ddcb-5f8ddd2 282->283 284 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 282->284 283->276 289 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 283->289 284->276 313 5f8db6f-5f8db81 285->313 314 5f8d952-5f8d959 285->314 297 5f8db9d 286->297 289->276 297->297 313->285 313->286 318 5f8d95f-5f8da6d 314->318 319 5f8da72-5f8da9d 314->319 318->313 319->313 323 5f8daa3-5f8db46 319->323 323->313 399->125 400->125 401->125 402->128 403->128 404->128 405->128 406->131 407->131 408->141 409->141 410->141 411->141 412->80 413->80 414->80 415->92 416->92 417->92 418->92 419->92 420->92 421->92 422->92 423->92 424->92 425->92 426->92 427->92 428->92 429->92 430->92 431->92 432->92 433->95 434->95 435->98 436->98 437->101 438->101 439->107 440->107 441->113 442->113 443->113 444->113 445->113 446->119 447->119 448->119
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8C870
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser$InitializeThunk
                                                • String ID:
                                                • API String ID: 2638914809-0
                                                • Opcode ID: 2a5f0e635ad4846e32e4e9bb9871d70921ed2fb2cc8a543fafd3d493c2a6fc7a
                                                • Instruction ID: 5a05be9e2b55ddb4f141c59aad8017dcc30468e06af4d981c4598b9fb21048af
                                                • Opcode Fuzzy Hash: 2a5f0e635ad4846e32e4e9bb9871d70921ed2fb2cc8a543fafd3d493c2a6fc7a
                                                • Instruction Fuzzy Hash: 80A23AB4A05228CFCB24EF30D9596ADB7B6BF49305F1080E9E54AA3344DB399E81CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 449 1083ef8-1083f11 450 1083fcc-1083fdc 449->450 451 1083f17-1083f2b 449->451 456 1083fe4-1083feb 450->456 574 1083fde call 1083e48 450->574 575 1083fde call 1083ef8 450->575 576 1083fde call 108419c 450->576 454 1083f2d-1083f2f 451->454 455 1083f31 451->455 457 1083f34-1083f49 454->457 455->457 459 1083f4b-1083f5a 457->459 460 1083f90-1083fb9 call 1083820 457->460 466 1083fec 459->466 467 1083f60-1083f63 459->467 464 1083fbb-1083fc2 460->464 465 1083fc4-1083fca 460->465 464->456 465->456 469 1083ff1-108402b 466->469 468 1083f69-1083f6f 467->468 467->469 468->460 471 1083f71-1083f8e 468->471 473 108406d-108406f 469->473 474 108402d-1084032 469->474 471->460 476 1084079-108408d 473->476 477 1084071-1084077 473->477 478 1084038-108403b 474->478 479 1084253 474->479 498 10840a8 476->498 499 108408f-1084093 476->499 480 10840ae-10840b0 477->480 481 1084258-10842cc 478->481 482 1084041-1084047 478->482 479->481 486 10840b9-10840c2 480->486 487 10840b2-10840b7 480->487 527 108446f-1084479 481->527 528 10842d2-108430e 481->528 482->473 485 1084049-1084068 482->485 505 108417d-1084191 485->505 496 10840d2-10840e4 486->496 497 10840c4-10840cd 486->497 487->486 488 108411c-108411f 487->488 488->479 490 1084125-1084128 488->490 490->481 495 108412e-1084134 490->495 501 1084155-1084166 495->501 502 1084136-1084153 495->502 496->479 509 10840ea-10840ed 496->509 497->501 498->480 499->498 503 1084095-10840a6 499->503 501->505 515 1084168-1084177 501->515 502->501 503->480 503->498 523 1084198-108422f 505->523 509->481 514 10840f3-10840f9 509->514 514->501 518 10840fb-108411a 514->518 515->505 518->501 535 1084231-1084235 523->535 536 1084237-108423d 523->536 542 108432d-108436c 528->542 543 1084310-1084325 528->543 535->536 537 108423f-1084245 535->537 538 1084247-1084250 536->538 537->538 546 1084372-10843a3 542->546 547 1084457-108446c 542->547 543->542 555 10843a9-108442f call 10829e8 546->555 556 1084442-1084451 546->556 551 108446d 547->551 551->551 555->556 556->546 556->547 574->456 575->456 576->456
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \$\$\$\
                                                • API String ID: 0-3238275731
                                                • Opcode ID: 0deb9686da4cc4f290a3530982c7516b5dc2f31614f2112a1850e314e38a314e
                                                • Instruction ID: b2e8d2a1e4f58237a06b5da248cf23983133677deef2528bf44c773083cc59c0
                                                • Opcode Fuzzy Hash: 0deb9686da4cc4f290a3530982c7516b5dc2f31614f2112a1850e314e38a314e
                                                • Instruction Fuzzy Hash: D7E1FF31B042158BCB24EF78C8457AEBAF2AFC4354F148569E496DB384EF79DC068B90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5711465240ca4d26653dd75b91e52043fe989b968d7f94c4e4e5d4f9e8693a7d
                                                • Instruction ID: c7de01c040f6b13984c8c76212046dc9b4c27dc9e8331cb128022eeb07c9b827
                                                • Opcode Fuzzy Hash: 5711465240ca4d26653dd75b91e52043fe989b968d7f94c4e4e5d4f9e8693a7d
                                                • Instruction Fuzzy Hash: FCE2E134B083448FDB56AB74C85876D7BF2AF85304F1584AAE489DB396DB38DC06CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05F8B63B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: 91e69657937236679fdc0d1ebd231fb595bd6464fc1814d4fa1edc2530b6677a
                                                • Instruction ID: caf8666dc28c595dc83fcb3e28b8c6fec685aebd4f1870f6a1c287c2645c1afe
                                                • Opcode Fuzzy Hash: 91e69657937236679fdc0d1ebd231fb595bd6464fc1814d4fa1edc2530b6677a
                                                • Instruction Fuzzy Hash: DD514571D102188FDB14DFA9C889BAEFBB1BF48314F148029E816BB394D778A844CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2255ac3cf27f0c9da971ff1099f690f0e22c642d7b8ff21736f4714a02521455
                                                • Instruction ID: 2b54571ddc0d2618d856cf55b1bb4a80feeee77cb2c800138ee4d7713070e034
                                                • Opcode Fuzzy Hash: 2255ac3cf27f0c9da971ff1099f690f0e22c642d7b8ff21736f4714a02521455
                                                • Instruction Fuzzy Hash: 0E926D74F002148FDB64EF78C8587AEBAF2AF85354F1084A8E44AAB384DF799D458F51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4a59852d6315ebee3cb12121b33d7b163c424dfd33bb4eca7d96aa1ad96663ab
                                                • Instruction ID: 0947368f4cc56935c8f4bb956aac1f39902606a96383c94a92a4e38ea2c4d4d1
                                                • Opcode Fuzzy Hash: 4a59852d6315ebee3cb12121b33d7b163c424dfd33bb4eca7d96aa1ad96663ab
                                                • Instruction Fuzzy Hash: 4E72E430B042049FEB25EB68C9547EEBBF2AF85314F148469E1CADB395CB74DC468B61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f8912b753f477478e55209f2f4d03baa0515191648adc7322cb71f9fc2e8aec5
                                                • Instruction ID: f4b3a68126e9b88792a334d0a66b2046fd4ede645fbf065d5c69f4101baabbba
                                                • Opcode Fuzzy Hash: f8912b753f477478e55209f2f4d03baa0515191648adc7322cb71f9fc2e8aec5
                                                • Instruction Fuzzy Hash: 5A42D470A042448FDB64EFA8C4547AEBBF2AF85304F1581A9D0899F386DF7ADC49CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 276ca8465285599001e5329eed5d63ad13d1fcc9af8c657d2894b193ca184dd2
                                                • Instruction ID: fa1e92264f7739b991d1898004c1eaf3d6c2e8c4b0c249692dbaf49e1a972c2f
                                                • Opcode Fuzzy Hash: 276ca8465285599001e5329eed5d63ad13d1fcc9af8c657d2894b193ca184dd2
                                                • Instruction Fuzzy Hash: E3D1B230B002155FD764AF7888587AFBAE3EFC4754F148868E48A9B784DF799C068B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 68480e40d441542f9c272cb4db192a95de23db59e570d113f1b6e78f9cd24b68
                                                • Instruction ID: df7631d1b2944ead2784f6140bf84b6b8540130d1d30d51bc1453a934b671eec
                                                • Opcode Fuzzy Hash: 68480e40d441542f9c272cb4db192a95de23db59e570d113f1b6e78f9cd24b68
                                                • Instruction Fuzzy Hash: 9CC1E630B042148FDB64BB78C8587BEBAE3AFC5358F148479D4899B395DF798C458B82
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 02D26BB0
                                                • GetCurrentThread.KERNEL32 ref: 02D26BED
                                                • GetCurrentProcess.KERNEL32 ref: 02D26C2A
                                                • GetCurrentThreadId.KERNEL32 ref: 02D26C83
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: b9d90dcec53a57dd8be407db8238ef867339820f455f5953a103a226652a114a
                                                • Instruction ID: 2b2eb222e27e500319112de627fa88c7e1a2f08adec5f4b3df75073723e43a20
                                                • Opcode Fuzzy Hash: b9d90dcec53a57dd8be407db8238ef867339820f455f5953a103a226652a114a
                                                • Instruction Fuzzy Hash: 1D5177B09003488FCB10CFA9DA487DEBFF1AF59318F248499E448A7791D774A848CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 02D26BB0
                                                • GetCurrentThread.KERNEL32 ref: 02D26BED
                                                • GetCurrentProcess.KERNEL32 ref: 02D26C2A
                                                • GetCurrentThreadId.KERNEL32 ref: 02D26C83
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 56de5835eb5b0065fe575303fb0d691ef61a3284c2c15ff3fe0e36b81c1307b6
                                                • Instruction ID: 775cdc0fe5d5bb79c36cb86590258e2f83869ceb972488b53f8b0a1e73b8f4c0
                                                • Opcode Fuzzy Hash: 56de5835eb5b0065fe575303fb0d691ef61a3284c2c15ff3fe0e36b81c1307b6
                                                • Instruction Fuzzy Hash: D85134B4A003488FDB24DFA9D6487DEBBF5EF58318F208459E409A7750D774A888CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 577 5f8c741-5f8ca9c KiUserExceptionDispatcher 936 5f8ca9c call 1080040 577->936 937 5f8ca9c call 1080011 577->937 938 5f8ca9c call 1081347 577->938 617 5f8caa2-5f8cb95 939 5f8cb95 call 10829e8 617->939 940 5f8cb95 call 1082ce8 617->940 941 5f8cb95 call 1082f68 617->941 942 5f8cb95 call 1082e28 617->942 943 5f8cb95 call 1082ec8 617->943 944 5f8cb95 call 108182c 617->944 945 5f8cb95 call 10829e0 617->945 946 5f8cb95 call 1082b58 617->946 947 5f8cb95 call 1082bf8 617->947 948 5f8cb95 call 1082dd8 617->948 949 5f8cb95 call 1082c98 617->949 950 5f8cb95 call 1081918 617->950 951 5f8cb95 call 1082a5f 617->951 952 5f8cb95 call 108301f 617->952 953 5f8cb95 call 1082990 617->953 954 5f8cb95 call 1081970 617->954 955 5f8cb95 call 10818d0 617->955 956 5f8cb95 call 1081d70 617->956 629 5f8cb9b-5f8cbda 957 5f8cbda call 1083080 629->957 958 5f8cbda call 10830e0 629->958 632 5f8cbe0-5f8cc1f 959 5f8cc1f call 1083898 632->959 960 5f8cc1f call 10838a8 632->960 635 5f8cc25-5f8cc64 961 5f8cc64 call 1083b98 635->961 962 5f8cc64 call 1083ba8 635->962 638 5f8cc6a-5f8ccee 963 5f8ccee call 10844e8 638->963 964 5f8ccee call 1084489 638->964 644 5f8ccf4-5f8cd78 965 5f8cd78 call 1084a5a 644->965 966 5f8cd78 call 1084910 644->966 967 5f8cd78 call 10848b1 644->967 968 5f8cd78 call 1084c24 644->968 969 5f8cd78 call 1084d87 644->969 650 5f8cd7e-5f8ce02 970 5f8ce02 call 10856a8 650->970 971 5f8ce02 call 1085707 650->971 972 5f8ce02 call 1085647 650->972 656 5f8ce08-5f8ce8c 973 5f8ce8c call 1085b88 656->973 974 5f8ce8c call 1085b29 656->974 975 5f8ce8c call 1085be7 656->975 662 5f8ce92-5f8ced4 976 5f8ced4 call 1085ca8 662->976 977 5f8ced4 call 1085c49 662->977 978 5f8ced4 call 1085f40 662->978 979 5f8ced4 call 1085f94 662->979 665 5f8ceda-5f8cf10 980 5f8cf10 call 108e639 665->980 981 5f8cf10 call 108ebe0 665->981 668 5f8cf16-5f8cfd7 982 5f8cfdd call 108fded 668->982 983 5f8cfdd call 108fc80 668->983 984 5f8cfdd call 108fd11 668->984 985 5f8cfdd call 108fbd4 668->985 678 5f8cfe3-5f8d131 LdrInitializeThunk 699 5f8d453-5f8d781 KiUserExceptionDispatcher 678->699 700 5f8d137-5f8d15b 678->700 797 5f8d787-5f8d8ab 699->797 706 5f8d161 700->706 707 5f8d2b4-5f8d2d8 700->707 706->707 708 5f8d167-5f8d2af 706->708 715 5f8d2da 707->715 716 5f8d2de-5f8d2e0 707->716 708->699 718 5f8d2dc 715->718 719 5f8d2e2 715->719 720 5f8d2e7-5f8d311 716->720 718->716 719->720 729 5f8d313 720->729 730 5f8d317-5f8d319 720->730 731 5f8d31b 729->731 732 5f8d315 729->732 733 5f8d320-5f8d326 730->733 731->733 732->730 733->699 736 5f8d32c-5f8d42a 733->736 736->699 809 5f8db9f-5f8dbb0 797->809 810 5f8d8b1-5f8d8d4 797->810 813 5f8df0a-5f8df11 809->813 814 5f8dbb6-5f8dbbd 809->814 822 5f8d8da-5f8d94c 810->822 823 5f8db87-5f8db9c 810->823 815 5f8df93-5f8dfae 813->815 816 5f8df17-5f8df88 813->816 818 5f8dbc3-5f8dc23 814->818 819 5f8dc54-5f8dc5b 814->819 816->815 818->813 820 5f8ddcb-5f8ddd2 819->820 821 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 819->821 820->813 826 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 820->826 821->813 850 5f8db6f-5f8db81 822->850 851 5f8d952-5f8d959 822->851 834 5f8db9d 823->834 826->813 834->834 850->822 850->823 855 5f8d95f-5f8da6d 851->855 856 5f8da72-5f8da9d 851->856 855->850 856->850 860 5f8daa3-5f8db46 856->860 860->850 936->617 937->617 938->617 939->629 940->629 941->629 942->629 943->629 944->629 945->629 946->629 947->629 948->629 949->629 950->629 951->629 952->629 953->629 954->629 955->629 956->629 957->632 958->632 959->635 960->635 961->638 962->638 963->644 964->644 965->650 966->650 967->650 968->650 969->650 970->656 971->656 972->656 973->662 974->662 975->662 976->665 977->665 978->665 979->665 980->668 981->668 982->678 983->678 984->678 985->678
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8C870
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser$InitializeThunk
                                                • String ID:
                                                • API String ID: 2638914809-0
                                                • Opcode ID: c46d8444eb7472945fd5ec32590714f8a3f2aed6f9d7fa6e2782c4bf4e97281c
                                                • Instruction ID: 81ab9419c0b08d21b0a7817bd89b9267e9f59184a1b1dd07adf4e02dbc941a72
                                                • Opcode Fuzzy Hash: c46d8444eb7472945fd5ec32590714f8a3f2aed6f9d7fa6e2782c4bf4e97281c
                                                • Instruction Fuzzy Hash: EC624AB5905228CFCB24EF30D9996ADB7B6BF49345F1080EAE54A93340DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 986 5f8c77d-5f8ca9c KiUserExceptionDispatcher 1389 5f8ca9c call 1080040 986->1389 1390 5f8ca9c call 1080011 986->1390 1391 5f8ca9c call 1081347 986->1391 1023 5f8caa2-5f8cb95 1342 5f8cb95 call 10829e8 1023->1342 1343 5f8cb95 call 1082ce8 1023->1343 1344 5f8cb95 call 1082f68 1023->1344 1345 5f8cb95 call 1082e28 1023->1345 1346 5f8cb95 call 1082ec8 1023->1346 1347 5f8cb95 call 108182c 1023->1347 1348 5f8cb95 call 10829e0 1023->1348 1349 5f8cb95 call 1082b58 1023->1349 1350 5f8cb95 call 1082bf8 1023->1350 1351 5f8cb95 call 1082dd8 1023->1351 1352 5f8cb95 call 1082c98 1023->1352 1353 5f8cb95 call 1081918 1023->1353 1354 5f8cb95 call 1082a5f 1023->1354 1355 5f8cb95 call 108301f 1023->1355 1356 5f8cb95 call 1082990 1023->1356 1357 5f8cb95 call 1081970 1023->1357 1358 5f8cb95 call 10818d0 1023->1358 1359 5f8cb95 call 1081d70 1023->1359 1035 5f8cb9b-5f8cbda 1360 5f8cbda call 1083080 1035->1360 1361 5f8cbda call 10830e0 1035->1361 1038 5f8cbe0-5f8cc1f 1362 5f8cc1f call 1083898 1038->1362 1363 5f8cc1f call 10838a8 1038->1363 1041 5f8cc25-5f8cc64 1364 5f8cc64 call 1083b98 1041->1364 1365 5f8cc64 call 1083ba8 1041->1365 1044 5f8cc6a-5f8ccee 1366 5f8ccee call 10844e8 1044->1366 1367 5f8ccee call 1084489 1044->1367 1050 5f8ccf4-5f8cd78 1368 5f8cd78 call 1084a5a 1050->1368 1369 5f8cd78 call 1084910 1050->1369 1370 5f8cd78 call 10848b1 1050->1370 1371 5f8cd78 call 1084c24 1050->1371 1372 5f8cd78 call 1084d87 1050->1372 1056 5f8cd7e-5f8ce02 1373 5f8ce02 call 10856a8 1056->1373 1374 5f8ce02 call 1085707 1056->1374 1375 5f8ce02 call 1085647 1056->1375 1062 5f8ce08-5f8ce8c 1376 5f8ce8c call 1085b88 1062->1376 1377 5f8ce8c call 1085b29 1062->1377 1378 5f8ce8c call 1085be7 1062->1378 1068 5f8ce92-5f8ced4 1379 5f8ced4 call 1085ca8 1068->1379 1380 5f8ced4 call 1085c49 1068->1380 1381 5f8ced4 call 1085f40 1068->1381 1382 5f8ced4 call 1085f94 1068->1382 1071 5f8ceda-5f8cf10 1383 5f8cf10 call 108e639 1071->1383 1384 5f8cf10 call 108ebe0 1071->1384 1074 5f8cf16-5f8cfd7 1385 5f8cfdd call 108fded 1074->1385 1386 5f8cfdd call 108fc80 1074->1386 1387 5f8cfdd call 108fd11 1074->1387 1388 5f8cfdd call 108fbd4 1074->1388 1084 5f8cfe3-5f8d131 LdrInitializeThunk 1105 5f8d453-5f8d781 KiUserExceptionDispatcher 1084->1105 1106 5f8d137-5f8d15b 1084->1106 1203 5f8d787-5f8d8ab 1105->1203 1112 5f8d161 1106->1112 1113 5f8d2b4-5f8d2d8 1106->1113 1112->1113 1114 5f8d167-5f8d2af 1112->1114 1121 5f8d2da 1113->1121 1122 5f8d2de-5f8d2e0 1113->1122 1114->1105 1124 5f8d2dc 1121->1124 1125 5f8d2e2 1121->1125 1126 5f8d2e7-5f8d311 1122->1126 1124->1122 1125->1126 1135 5f8d313 1126->1135 1136 5f8d317-5f8d319 1126->1136 1137 5f8d31b 1135->1137 1138 5f8d315 1135->1138 1139 5f8d320-5f8d326 1136->1139 1137->1139 1138->1136 1139->1105 1142 5f8d32c-5f8d42a 1139->1142 1142->1105 1215 5f8db9f-5f8dbb0 1203->1215 1216 5f8d8b1-5f8d8d4 1203->1216 1219 5f8df0a-5f8df11 1215->1219 1220 5f8dbb6-5f8dbbd 1215->1220 1228 5f8d8da-5f8d94c 1216->1228 1229 5f8db87-5f8db9c 1216->1229 1221 5f8df93-5f8dfae 1219->1221 1222 5f8df17-5f8df88 1219->1222 1224 5f8dbc3-5f8dc23 1220->1224 1225 5f8dc54-5f8dc5b 1220->1225 1222->1221 1224->1219 1226 5f8ddcb-5f8ddd2 1225->1226 1227 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 1225->1227 1226->1219 1232 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 1226->1232 1227->1219 1256 5f8db6f-5f8db81 1228->1256 1257 5f8d952-5f8d959 1228->1257 1240 5f8db9d 1229->1240 1232->1219 1240->1240 1256->1228 1256->1229 1261 5f8d95f-5f8da6d 1257->1261 1262 5f8da72-5f8da9d 1257->1262 1261->1256 1262->1256 1266 5f8daa3-5f8db46 1262->1266 1266->1256 1342->1035 1343->1035 1344->1035 1345->1035 1346->1035 1347->1035 1348->1035 1349->1035 1350->1035 1351->1035 1352->1035 1353->1035 1354->1035 1355->1035 1356->1035 1357->1035 1358->1035 1359->1035 1360->1038 1361->1038 1362->1041 1363->1041 1364->1044 1365->1044 1366->1050 1367->1050 1368->1056 1369->1056 1370->1056 1371->1056 1372->1056 1373->1062 1374->1062 1375->1062 1376->1068 1377->1068 1378->1068 1379->1071 1380->1071 1381->1071 1382->1071 1383->1074 1384->1074 1385->1084 1386->1084 1387->1084 1388->1084 1389->1023 1390->1023 1391->1023
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8C870
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser$InitializeThunk
                                                • String ID:
                                                • API String ID: 2638914809-0
                                                • Opcode ID: 20e3491f3c46da9abb3c057c0581d3fdbbdf0b188182f2817a1f5575483a8db5
                                                • Instruction ID: 67b0c6fa7e92692819d6fc0452284841e5eb90183bef15049d03e6473b20ae30
                                                • Opcode Fuzzy Hash: 20e3491f3c46da9abb3c057c0581d3fdbbdf0b188182f2817a1f5575483a8db5
                                                • Instruction Fuzzy Hash: CC624BB5905228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993340DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1392 5f8c7c2-5f8ca9c KiUserExceptionDispatcher 1745 5f8ca9c call 1080040 1392->1745 1746 5f8ca9c call 1080011 1392->1746 1747 5f8ca9c call 1081347 1392->1747 1426 5f8caa2-5f8cb95 1748 5f8cb95 call 10829e8 1426->1748 1749 5f8cb95 call 1082ce8 1426->1749 1750 5f8cb95 call 1082f68 1426->1750 1751 5f8cb95 call 1082e28 1426->1751 1752 5f8cb95 call 1082ec8 1426->1752 1753 5f8cb95 call 108182c 1426->1753 1754 5f8cb95 call 10829e0 1426->1754 1755 5f8cb95 call 1082b58 1426->1755 1756 5f8cb95 call 1082bf8 1426->1756 1757 5f8cb95 call 1082dd8 1426->1757 1758 5f8cb95 call 1082c98 1426->1758 1759 5f8cb95 call 1081918 1426->1759 1760 5f8cb95 call 1082a5f 1426->1760 1761 5f8cb95 call 108301f 1426->1761 1762 5f8cb95 call 1082990 1426->1762 1763 5f8cb95 call 1081970 1426->1763 1764 5f8cb95 call 10818d0 1426->1764 1765 5f8cb95 call 1081d70 1426->1765 1438 5f8cb9b-5f8cbda 1766 5f8cbda call 1083080 1438->1766 1767 5f8cbda call 10830e0 1438->1767 1441 5f8cbe0-5f8cc1f 1768 5f8cc1f call 1083898 1441->1768 1769 5f8cc1f call 10838a8 1441->1769 1444 5f8cc25-5f8cc64 1770 5f8cc64 call 1083b98 1444->1770 1771 5f8cc64 call 1083ba8 1444->1771 1447 5f8cc6a-5f8ccee 1772 5f8ccee call 10844e8 1447->1772 1773 5f8ccee call 1084489 1447->1773 1453 5f8ccf4-5f8cd78 1774 5f8cd78 call 1084a5a 1453->1774 1775 5f8cd78 call 1084910 1453->1775 1776 5f8cd78 call 10848b1 1453->1776 1777 5f8cd78 call 1084c24 1453->1777 1778 5f8cd78 call 1084d87 1453->1778 1459 5f8cd7e-5f8ce02 1779 5f8ce02 call 10856a8 1459->1779 1780 5f8ce02 call 1085707 1459->1780 1781 5f8ce02 call 1085647 1459->1781 1465 5f8ce08-5f8ce8c 1782 5f8ce8c call 1085b88 1465->1782 1783 5f8ce8c call 1085b29 1465->1783 1784 5f8ce8c call 1085be7 1465->1784 1471 5f8ce92-5f8ced4 1785 5f8ced4 call 1085ca8 1471->1785 1786 5f8ced4 call 1085c49 1471->1786 1787 5f8ced4 call 1085f40 1471->1787 1788 5f8ced4 call 1085f94 1471->1788 1474 5f8ceda-5f8cf10 1789 5f8cf10 call 108e639 1474->1789 1790 5f8cf10 call 108ebe0 1474->1790 1477 5f8cf16-5f8cfd7 1791 5f8cfdd call 108fded 1477->1791 1792 5f8cfdd call 108fc80 1477->1792 1793 5f8cfdd call 108fd11 1477->1793 1794 5f8cfdd call 108fbd4 1477->1794 1487 5f8cfe3-5f8d131 LdrInitializeThunk 1508 5f8d453-5f8d781 KiUserExceptionDispatcher 1487->1508 1509 5f8d137-5f8d15b 1487->1509 1606 5f8d787-5f8d8ab 1508->1606 1515 5f8d161 1509->1515 1516 5f8d2b4-5f8d2d8 1509->1516 1515->1516 1517 5f8d167-5f8d2af 1515->1517 1524 5f8d2da 1516->1524 1525 5f8d2de-5f8d2e0 1516->1525 1517->1508 1527 5f8d2dc 1524->1527 1528 5f8d2e2 1524->1528 1529 5f8d2e7-5f8d311 1525->1529 1527->1525 1528->1529 1538 5f8d313 1529->1538 1539 5f8d317-5f8d319 1529->1539 1540 5f8d31b 1538->1540 1541 5f8d315 1538->1541 1542 5f8d320-5f8d326 1539->1542 1540->1542 1541->1539 1542->1508 1545 5f8d32c-5f8d42a 1542->1545 1545->1508 1618 5f8db9f-5f8dbb0 1606->1618 1619 5f8d8b1-5f8d8d4 1606->1619 1622 5f8df0a-5f8df11 1618->1622 1623 5f8dbb6-5f8dbbd 1618->1623 1631 5f8d8da-5f8d94c 1619->1631 1632 5f8db87-5f8db9c 1619->1632 1624 5f8df93-5f8dfae 1622->1624 1625 5f8df17-5f8df88 1622->1625 1627 5f8dbc3-5f8dc23 1623->1627 1628 5f8dc54-5f8dc5b 1623->1628 1625->1624 1627->1622 1629 5f8ddcb-5f8ddd2 1628->1629 1630 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 1628->1630 1629->1622 1635 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 1629->1635 1630->1622 1659 5f8db6f-5f8db81 1631->1659 1660 5f8d952-5f8d959 1631->1660 1643 5f8db9d 1632->1643 1635->1622 1643->1643 1659->1631 1659->1632 1664 5f8d95f-5f8da6d 1660->1664 1665 5f8da72-5f8da9d 1660->1665 1664->1659 1665->1659 1669 5f8daa3-5f8db46 1665->1669 1669->1659 1745->1426 1746->1426 1747->1426 1748->1438 1749->1438 1750->1438 1751->1438 1752->1438 1753->1438 1754->1438 1755->1438 1756->1438 1757->1438 1758->1438 1759->1438 1760->1438 1761->1438 1762->1438 1763->1438 1764->1438 1765->1438 1766->1441 1767->1441 1768->1444 1769->1444 1770->1447 1771->1447 1772->1453 1773->1453 1774->1459 1775->1459 1776->1459 1777->1459 1778->1459 1779->1465 1780->1465 1781->1465 1782->1471 1783->1471 1784->1471 1785->1474 1786->1474 1787->1474 1788->1474 1789->1477 1790->1477 1791->1487 1792->1487 1793->1487 1794->1487
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8C870
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser$InitializeThunk
                                                • String ID:
                                                • API String ID: 2638914809-0
                                                • Opcode ID: ab721266d166f02cb2d5e1be7794bb5ab65cb4d94382fb283c4fffd5773e64be
                                                • Instruction ID: c51fdb889227cfcc654a2ce29c48d5c3e379f838db4f96b3b4578e15fbfe4d1c
                                                • Opcode Fuzzy Hash: ab721266d166f02cb2d5e1be7794bb5ab65cb4d94382fb283c4fffd5773e64be
                                                • Instruction Fuzzy Hash: 6F524BB5905228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993340DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1795 5f8c84c-5f8ca9c KiUserExceptionDispatcher 2158 5f8ca9c call 1080040 1795->2158 2159 5f8ca9c call 1080011 1795->2159 2160 5f8ca9c call 1081347 1795->2160 1823 5f8caa2-5f8cb95 2161 5f8cb95 call 10829e8 1823->2161 2162 5f8cb95 call 1082ce8 1823->2162 2163 5f8cb95 call 1082f68 1823->2163 2164 5f8cb95 call 1082e28 1823->2164 2165 5f8cb95 call 1082ec8 1823->2165 2166 5f8cb95 call 108182c 1823->2166 2167 5f8cb95 call 10829e0 1823->2167 2168 5f8cb95 call 1082b58 1823->2168 2169 5f8cb95 call 1082bf8 1823->2169 2170 5f8cb95 call 1082dd8 1823->2170 2171 5f8cb95 call 1082c98 1823->2171 2172 5f8cb95 call 1081918 1823->2172 2173 5f8cb95 call 1082a5f 1823->2173 2174 5f8cb95 call 108301f 1823->2174 2175 5f8cb95 call 1082990 1823->2175 2176 5f8cb95 call 1081970 1823->2176 2177 5f8cb95 call 10818d0 1823->2177 2178 5f8cb95 call 1081d70 1823->2178 1835 5f8cb9b-5f8cbda 2179 5f8cbda call 1083080 1835->2179 2180 5f8cbda call 10830e0 1835->2180 1838 5f8cbe0-5f8cc1f 2181 5f8cc1f call 1083898 1838->2181 2182 5f8cc1f call 10838a8 1838->2182 1841 5f8cc25-5f8cc64 2183 5f8cc64 call 1083b98 1841->2183 2184 5f8cc64 call 1083ba8 1841->2184 1844 5f8cc6a-5f8ccee 2185 5f8ccee call 10844e8 1844->2185 2186 5f8ccee call 1084489 1844->2186 1850 5f8ccf4-5f8cd78 2187 5f8cd78 call 1084a5a 1850->2187 2188 5f8cd78 call 1084910 1850->2188 2189 5f8cd78 call 10848b1 1850->2189 2190 5f8cd78 call 1084c24 1850->2190 2191 5f8cd78 call 1084d87 1850->2191 1856 5f8cd7e-5f8ce02 2142 5f8ce02 call 10856a8 1856->2142 2143 5f8ce02 call 1085707 1856->2143 2144 5f8ce02 call 1085647 1856->2144 1862 5f8ce08-5f8ce8c 2145 5f8ce8c call 1085b88 1862->2145 2146 5f8ce8c call 1085b29 1862->2146 2147 5f8ce8c call 1085be7 1862->2147 1868 5f8ce92-5f8ced4 2148 5f8ced4 call 1085ca8 1868->2148 2149 5f8ced4 call 1085c49 1868->2149 2150 5f8ced4 call 1085f40 1868->2150 2151 5f8ced4 call 1085f94 1868->2151 1871 5f8ceda-5f8cf10 2152 5f8cf10 call 108e639 1871->2152 2153 5f8cf10 call 108ebe0 1871->2153 1874 5f8cf16-5f8cfd7 2154 5f8cfdd call 108fded 1874->2154 2155 5f8cfdd call 108fc80 1874->2155 2156 5f8cfdd call 108fd11 1874->2156 2157 5f8cfdd call 108fbd4 1874->2157 1884 5f8cfe3-5f8d131 LdrInitializeThunk 1905 5f8d453-5f8d781 KiUserExceptionDispatcher 1884->1905 1906 5f8d137-5f8d15b 1884->1906 2003 5f8d787-5f8d8ab 1905->2003 1912 5f8d161 1906->1912 1913 5f8d2b4-5f8d2d8 1906->1913 1912->1913 1914 5f8d167-5f8d2af 1912->1914 1921 5f8d2da 1913->1921 1922 5f8d2de-5f8d2e0 1913->1922 1914->1905 1924 5f8d2dc 1921->1924 1925 5f8d2e2 1921->1925 1926 5f8d2e7-5f8d311 1922->1926 1924->1922 1925->1926 1935 5f8d313 1926->1935 1936 5f8d317-5f8d319 1926->1936 1937 5f8d31b 1935->1937 1938 5f8d315 1935->1938 1939 5f8d320-5f8d326 1936->1939 1937->1939 1938->1936 1939->1905 1942 5f8d32c-5f8d42a 1939->1942 1942->1905 2015 5f8db9f-5f8dbb0 2003->2015 2016 5f8d8b1-5f8d8d4 2003->2016 2019 5f8df0a-5f8df11 2015->2019 2020 5f8dbb6-5f8dbbd 2015->2020 2028 5f8d8da-5f8d94c 2016->2028 2029 5f8db87-5f8db9c 2016->2029 2021 5f8df93-5f8dfae 2019->2021 2022 5f8df17-5f8df88 2019->2022 2024 5f8dbc3-5f8dc23 2020->2024 2025 5f8dc54-5f8dc5b 2020->2025 2022->2021 2024->2019 2026 5f8ddcb-5f8ddd2 2025->2026 2027 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 2025->2027 2026->2019 2032 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 2026->2032 2027->2019 2056 5f8db6f-5f8db81 2028->2056 2057 5f8d952-5f8d959 2028->2057 2040 5f8db9d 2029->2040 2032->2019 2040->2040 2056->2028 2056->2029 2061 5f8d95f-5f8da6d 2057->2061 2062 5f8da72-5f8da9d 2057->2062 2061->2056 2062->2056 2066 5f8daa3-5f8db46 2062->2066 2066->2056 2142->1862 2143->1862 2144->1862 2145->1868 2146->1868 2147->1868 2148->1871 2149->1871 2150->1871 2151->1871 2152->1874 2153->1874 2154->1884 2155->1884 2156->1884 2157->1884 2158->1823 2159->1823 2160->1823 2161->1835 2162->1835 2163->1835 2164->1835 2165->1835 2166->1835 2167->1835 2168->1835 2169->1835 2170->1835 2171->1835 2172->1835 2173->1835 2174->1835 2175->1835 2176->1835 2177->1835 2178->1835 2179->1838 2180->1838 2181->1841 2182->1841 2183->1844 2184->1844 2185->1850 2186->1850 2187->1856 2188->1856 2189->1856 2190->1856 2191->1856
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8C870
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser$InitializeThunk
                                                • String ID:
                                                • API String ID: 2638914809-0
                                                • Opcode ID: e4e1536682afaf7c35ad6f9c42f54e99f335e570b95cedbf185c0805d0915e99
                                                • Instruction ID: 261d4eb9f4fba8be50de8d04b22d61bfa91f6f46c3dc76831699db80ee2d48af
                                                • Opcode Fuzzy Hash: e4e1536682afaf7c35ad6f9c42f54e99f335e570b95cedbf185c0805d0915e99
                                                • Instruction Fuzzy Hash: D3524BB5A05228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2192 5f8c891-5f8ca9c 2537 5f8ca9c call 1080040 2192->2537 2538 5f8ca9c call 1080011 2192->2538 2539 5f8ca9c call 1081347 2192->2539 2218 5f8caa2-5f8cb95 2540 5f8cb95 call 10829e8 2218->2540 2541 5f8cb95 call 1082ce8 2218->2541 2542 5f8cb95 call 1082f68 2218->2542 2543 5f8cb95 call 1082e28 2218->2543 2544 5f8cb95 call 1082ec8 2218->2544 2545 5f8cb95 call 108182c 2218->2545 2546 5f8cb95 call 10829e0 2218->2546 2547 5f8cb95 call 1082b58 2218->2547 2548 5f8cb95 call 1082bf8 2218->2548 2549 5f8cb95 call 1082dd8 2218->2549 2550 5f8cb95 call 1082c98 2218->2550 2551 5f8cb95 call 1081918 2218->2551 2552 5f8cb95 call 1082a5f 2218->2552 2553 5f8cb95 call 108301f 2218->2553 2554 5f8cb95 call 1082990 2218->2554 2555 5f8cb95 call 1081970 2218->2555 2556 5f8cb95 call 10818d0 2218->2556 2557 5f8cb95 call 1081d70 2218->2557 2230 5f8cb9b-5f8cbda 2558 5f8cbda call 1083080 2230->2558 2559 5f8cbda call 10830e0 2230->2559 2233 5f8cbe0-5f8cc1f 2560 5f8cc1f call 1083898 2233->2560 2561 5f8cc1f call 10838a8 2233->2561 2236 5f8cc25-5f8cc64 2562 5f8cc64 call 1083b98 2236->2562 2563 5f8cc64 call 1083ba8 2236->2563 2239 5f8cc6a-5f8ccee 2564 5f8ccee call 10844e8 2239->2564 2565 5f8ccee call 1084489 2239->2565 2245 5f8ccf4-5f8cd78 2566 5f8cd78 call 1084a5a 2245->2566 2567 5f8cd78 call 1084910 2245->2567 2568 5f8cd78 call 10848b1 2245->2568 2569 5f8cd78 call 1084c24 2245->2569 2570 5f8cd78 call 1084d87 2245->2570 2251 5f8cd7e-5f8ce02 2571 5f8ce02 call 10856a8 2251->2571 2572 5f8ce02 call 1085707 2251->2572 2573 5f8ce02 call 1085647 2251->2573 2257 5f8ce08-5f8ce8c 2574 5f8ce8c call 1085b88 2257->2574 2575 5f8ce8c call 1085b29 2257->2575 2576 5f8ce8c call 1085be7 2257->2576 2263 5f8ce92-5f8ced4 2577 5f8ced4 call 1085ca8 2263->2577 2578 5f8ced4 call 1085c49 2263->2578 2579 5f8ced4 call 1085f40 2263->2579 2580 5f8ced4 call 1085f94 2263->2580 2266 5f8ceda-5f8cf10 2581 5f8cf10 call 108e639 2266->2581 2582 5f8cf10 call 108ebe0 2266->2582 2269 5f8cf16-5f8cfd7 2583 5f8cfdd call 108fded 2269->2583 2584 5f8cfdd call 108fc80 2269->2584 2585 5f8cfdd call 108fd11 2269->2585 2586 5f8cfdd call 108fbd4 2269->2586 2279 5f8cfe3-5f8d131 LdrInitializeThunk 2300 5f8d453-5f8d781 KiUserExceptionDispatcher 2279->2300 2301 5f8d137-5f8d15b 2279->2301 2398 5f8d787-5f8d8ab 2300->2398 2307 5f8d161 2301->2307 2308 5f8d2b4-5f8d2d8 2301->2308 2307->2308 2309 5f8d167-5f8d2af 2307->2309 2316 5f8d2da 2308->2316 2317 5f8d2de-5f8d2e0 2308->2317 2309->2300 2319 5f8d2dc 2316->2319 2320 5f8d2e2 2316->2320 2321 5f8d2e7-5f8d311 2317->2321 2319->2317 2320->2321 2330 5f8d313 2321->2330 2331 5f8d317-5f8d319 2321->2331 2332 5f8d31b 2330->2332 2333 5f8d315 2330->2333 2334 5f8d320-5f8d326 2331->2334 2332->2334 2333->2331 2334->2300 2337 5f8d32c-5f8d42a 2334->2337 2337->2300 2410 5f8db9f-5f8dbb0 2398->2410 2411 5f8d8b1-5f8d8d4 2398->2411 2414 5f8df0a-5f8df11 2410->2414 2415 5f8dbb6-5f8dbbd 2410->2415 2423 5f8d8da-5f8d94c 2411->2423 2424 5f8db87-5f8db9c 2411->2424 2416 5f8df93-5f8dfae 2414->2416 2417 5f8df17-5f8df88 2414->2417 2419 5f8dbc3-5f8dc23 2415->2419 2420 5f8dc54-5f8dc5b 2415->2420 2417->2416 2419->2414 2421 5f8ddcb-5f8ddd2 2420->2421 2422 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 2420->2422 2421->2414 2427 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 2421->2427 2422->2414 2451 5f8db6f-5f8db81 2423->2451 2452 5f8d952-5f8d959 2423->2452 2435 5f8db9d 2424->2435 2427->2414 2435->2435 2451->2423 2451->2424 2456 5f8d95f-5f8da6d 2452->2456 2457 5f8da72-5f8da9d 2452->2457 2456->2451 2457->2451 2461 5f8daa3-5f8db46 2457->2461 2461->2451 2537->2218 2538->2218 2539->2218 2540->2230 2541->2230 2542->2230 2543->2230 2544->2230 2545->2230 2546->2230 2547->2230 2548->2230 2549->2230 2550->2230 2551->2230 2552->2230 2553->2230 2554->2230 2555->2230 2556->2230 2557->2230 2558->2233 2559->2233 2560->2236 2561->2236 2562->2239 2563->2239 2564->2245 2565->2245 2566->2251 2567->2251 2568->2251 2569->2251 2570->2251 2571->2257 2572->2257 2573->2257 2574->2263 2575->2263 2576->2263 2577->2266 2578->2266 2579->2266 2580->2266 2581->2269 2582->2269 2583->2279 2584->2279 2585->2279 2586->2279
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: e63c1c416f075101e4db71dd6f6f29b44f061ed2f1d16d998cc8bedfbfa5e366
                                                • Instruction ID: 34c9cce6cb911fd9eb263f45ea2e15210a4994fce62f5bd72f95172ce40b5e26
                                                • Opcode Fuzzy Hash: e63c1c416f075101e4db71dd6f6f29b44f061ed2f1d16d998cc8bedfbfa5e366
                                                • Instruction Fuzzy Hash: 90524BB5A05218CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2587 5f8c8d6-5f8ca9c 2944 5f8ca9c call 1080040 2587->2944 2945 5f8ca9c call 1080011 2587->2945 2946 5f8ca9c call 1081347 2587->2946 2610 5f8caa2-5f8cb95 2957 5f8cb95 call 10829e8 2610->2957 2958 5f8cb95 call 1082ce8 2610->2958 2959 5f8cb95 call 1082f68 2610->2959 2960 5f8cb95 call 1082e28 2610->2960 2961 5f8cb95 call 1082ec8 2610->2961 2962 5f8cb95 call 108182c 2610->2962 2963 5f8cb95 call 10829e0 2610->2963 2964 5f8cb95 call 1082b58 2610->2964 2965 5f8cb95 call 1082bf8 2610->2965 2966 5f8cb95 call 1082dd8 2610->2966 2967 5f8cb95 call 1082c98 2610->2967 2968 5f8cb95 call 1081918 2610->2968 2969 5f8cb95 call 1082a5f 2610->2969 2970 5f8cb95 call 108301f 2610->2970 2971 5f8cb95 call 1082990 2610->2971 2972 5f8cb95 call 1081970 2610->2972 2973 5f8cb95 call 10818d0 2610->2973 2974 5f8cb95 call 1081d70 2610->2974 2622 5f8cb9b-5f8cbda 2977 5f8cbda call 1083080 2622->2977 2978 5f8cbda call 10830e0 2622->2978 2625 5f8cbe0-5f8cc1f 2929 5f8cc1f call 1083898 2625->2929 2930 5f8cc1f call 10838a8 2625->2930 2628 5f8cc25-5f8cc64 2931 5f8cc64 call 1083b98 2628->2931 2932 5f8cc64 call 1083ba8 2628->2932 2631 5f8cc6a-5f8ccee 2937 5f8ccee call 10844e8 2631->2937 2938 5f8ccee call 1084489 2631->2938 2637 5f8ccf4-5f8cd78 2939 5f8cd78 call 1084a5a 2637->2939 2940 5f8cd78 call 1084910 2637->2940 2941 5f8cd78 call 10848b1 2637->2941 2942 5f8cd78 call 1084c24 2637->2942 2943 5f8cd78 call 1084d87 2637->2943 2643 5f8cd7e-5f8ce02 2947 5f8ce02 call 10856a8 2643->2947 2948 5f8ce02 call 1085707 2643->2948 2949 5f8ce02 call 1085647 2643->2949 2649 5f8ce08-5f8ce8c 2950 5f8ce8c call 1085b88 2649->2950 2951 5f8ce8c call 1085b29 2649->2951 2952 5f8ce8c call 1085be7 2649->2952 2655 5f8ce92-5f8ced4 2953 5f8ced4 call 1085ca8 2655->2953 2954 5f8ced4 call 1085c49 2655->2954 2955 5f8ced4 call 1085f40 2655->2955 2956 5f8ced4 call 1085f94 2655->2956 2658 5f8ceda-5f8cf10 2975 5f8cf10 call 108e639 2658->2975 2976 5f8cf10 call 108ebe0 2658->2976 2661 5f8cf16-5f8cfd7 2933 5f8cfdd call 108fded 2661->2933 2934 5f8cfdd call 108fc80 2661->2934 2935 5f8cfdd call 108fd11 2661->2935 2936 5f8cfdd call 108fbd4 2661->2936 2671 5f8cfe3-5f8d131 LdrInitializeThunk 2692 5f8d453-5f8d781 KiUserExceptionDispatcher 2671->2692 2693 5f8d137-5f8d15b 2671->2693 2790 5f8d787-5f8d8ab 2692->2790 2699 5f8d161 2693->2699 2700 5f8d2b4-5f8d2d8 2693->2700 2699->2700 2701 5f8d167-5f8d2af 2699->2701 2708 5f8d2da 2700->2708 2709 5f8d2de-5f8d2e0 2700->2709 2701->2692 2711 5f8d2dc 2708->2711 2712 5f8d2e2 2708->2712 2713 5f8d2e7-5f8d311 2709->2713 2711->2709 2712->2713 2722 5f8d313 2713->2722 2723 5f8d317-5f8d319 2713->2723 2724 5f8d31b 2722->2724 2725 5f8d315 2722->2725 2726 5f8d320-5f8d326 2723->2726 2724->2726 2725->2723 2726->2692 2729 5f8d32c-5f8d42a 2726->2729 2729->2692 2802 5f8db9f-5f8dbb0 2790->2802 2803 5f8d8b1-5f8d8d4 2790->2803 2806 5f8df0a-5f8df11 2802->2806 2807 5f8dbb6-5f8dbbd 2802->2807 2815 5f8d8da-5f8d94c 2803->2815 2816 5f8db87-5f8db9c 2803->2816 2808 5f8df93-5f8dfae 2806->2808 2809 5f8df17-5f8df88 2806->2809 2811 5f8dbc3-5f8dc23 2807->2811 2812 5f8dc54-5f8dc5b 2807->2812 2809->2808 2811->2806 2813 5f8ddcb-5f8ddd2 2812->2813 2814 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 2812->2814 2813->2806 2819 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 2813->2819 2814->2806 2843 5f8db6f-5f8db81 2815->2843 2844 5f8d952-5f8d959 2815->2844 2827 5f8db9d 2816->2827 2819->2806 2827->2827 2843->2815 2843->2816 2848 5f8d95f-5f8da6d 2844->2848 2849 5f8da72-5f8da9d 2844->2849 2848->2843 2849->2843 2853 5f8daa3-5f8db46 2849->2853 2853->2843 2929->2628 2930->2628 2931->2631 2932->2631 2933->2671 2934->2671 2935->2671 2936->2671 2937->2637 2938->2637 2939->2643 2940->2643 2941->2643 2942->2643 2943->2643 2944->2610 2945->2610 2946->2610 2947->2649 2948->2649 2949->2649 2950->2655 2951->2655 2952->2655 2953->2658 2954->2658 2955->2658 2956->2658 2957->2622 2958->2622 2959->2622 2960->2622 2961->2622 2962->2622 2963->2622 2964->2622 2965->2622 2966->2622 2967->2622 2968->2622 2969->2622 2970->2622 2971->2622 2972->2622 2973->2622 2974->2622 2975->2661 2976->2661 2977->2625 2978->2625
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: cd56493255693c645d6295659269123a34cd1e9d66c05ff8affba00dda7a30e8
                                                • Instruction ID: e984d0a497b2a8f064bb6c5fe2658140aeb55a386aae2ca6aad03d1a017da7f8
                                                • Opcode Fuzzy Hash: cd56493255693c645d6295659269123a34cd1e9d66c05ff8affba00dda7a30e8
                                                • Instruction Fuzzy Hash: 6F525BB5A05228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2979 5f8c931-5f8ca9c 3361 5f8ca9c call 1080040 2979->3361 3362 5f8ca9c call 1080011 2979->3362 3363 5f8ca9c call 1081347 2979->3363 2998 5f8caa2-5f8cb95 3324 5f8cb95 call 10829e8 2998->3324 3325 5f8cb95 call 1082ce8 2998->3325 3326 5f8cb95 call 1082f68 2998->3326 3327 5f8cb95 call 1082e28 2998->3327 3328 5f8cb95 call 1082ec8 2998->3328 3329 5f8cb95 call 108182c 2998->3329 3330 5f8cb95 call 10829e0 2998->3330 3331 5f8cb95 call 1082b58 2998->3331 3332 5f8cb95 call 1082bf8 2998->3332 3333 5f8cb95 call 1082dd8 2998->3333 3334 5f8cb95 call 1082c98 2998->3334 3335 5f8cb95 call 1081918 2998->3335 3336 5f8cb95 call 1082a5f 2998->3336 3337 5f8cb95 call 108301f 2998->3337 3338 5f8cb95 call 1082990 2998->3338 3339 5f8cb95 call 1081970 2998->3339 3340 5f8cb95 call 10818d0 2998->3340 3341 5f8cb95 call 1081d70 2998->3341 3010 5f8cb9b-5f8cbda 3344 5f8cbda call 1083080 3010->3344 3345 5f8cbda call 10830e0 3010->3345 3013 5f8cbe0-5f8cc1f 3346 5f8cc1f call 1083898 3013->3346 3347 5f8cc1f call 10838a8 3013->3347 3016 5f8cc25-5f8cc64 3348 5f8cc64 call 1083b98 3016->3348 3349 5f8cc64 call 1083ba8 3016->3349 3019 5f8cc6a-5f8ccee 3354 5f8ccee call 10844e8 3019->3354 3355 5f8ccee call 1084489 3019->3355 3025 5f8ccf4-5f8cd78 3356 5f8cd78 call 1084a5a 3025->3356 3357 5f8cd78 call 1084910 3025->3357 3358 5f8cd78 call 10848b1 3025->3358 3359 5f8cd78 call 1084c24 3025->3359 3360 5f8cd78 call 1084d87 3025->3360 3031 5f8cd7e-5f8ce02 3364 5f8ce02 call 10856a8 3031->3364 3365 5f8ce02 call 1085707 3031->3365 3366 5f8ce02 call 1085647 3031->3366 3037 5f8ce08-5f8ce8c 3317 5f8ce8c call 1085b88 3037->3317 3318 5f8ce8c call 1085b29 3037->3318 3319 5f8ce8c call 1085be7 3037->3319 3043 5f8ce92-5f8ced4 3320 5f8ced4 call 1085ca8 3043->3320 3321 5f8ced4 call 1085c49 3043->3321 3322 5f8ced4 call 1085f40 3043->3322 3323 5f8ced4 call 1085f94 3043->3323 3046 5f8ceda-5f8cf10 3342 5f8cf10 call 108e639 3046->3342 3343 5f8cf10 call 108ebe0 3046->3343 3049 5f8cf16-5f8cfd7 3350 5f8cfdd call 108fded 3049->3350 3351 5f8cfdd call 108fc80 3049->3351 3352 5f8cfdd call 108fd11 3049->3352 3353 5f8cfdd call 108fbd4 3049->3353 3059 5f8cfe3-5f8d131 LdrInitializeThunk 3080 5f8d453-5f8d781 KiUserExceptionDispatcher 3059->3080 3081 5f8d137-5f8d15b 3059->3081 3178 5f8d787-5f8d8ab 3080->3178 3087 5f8d161 3081->3087 3088 5f8d2b4-5f8d2d8 3081->3088 3087->3088 3089 5f8d167-5f8d2af 3087->3089 3096 5f8d2da 3088->3096 3097 5f8d2de-5f8d2e0 3088->3097 3089->3080 3099 5f8d2dc 3096->3099 3100 5f8d2e2 3096->3100 3101 5f8d2e7-5f8d311 3097->3101 3099->3097 3100->3101 3110 5f8d313 3101->3110 3111 5f8d317-5f8d319 3101->3111 3112 5f8d31b 3110->3112 3113 5f8d315 3110->3113 3114 5f8d320-5f8d326 3111->3114 3112->3114 3113->3111 3114->3080 3117 5f8d32c-5f8d42a 3114->3117 3117->3080 3190 5f8db9f-5f8dbb0 3178->3190 3191 5f8d8b1-5f8d8d4 3178->3191 3194 5f8df0a-5f8df11 3190->3194 3195 5f8dbb6-5f8dbbd 3190->3195 3203 5f8d8da-5f8d94c 3191->3203 3204 5f8db87-5f8db9c 3191->3204 3196 5f8df93-5f8dfae 3194->3196 3197 5f8df17-5f8df88 3194->3197 3199 5f8dbc3-5f8dc23 3195->3199 3200 5f8dc54-5f8dc5b 3195->3200 3197->3196 3199->3194 3201 5f8ddcb-5f8ddd2 3200->3201 3202 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 3200->3202 3201->3194 3207 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 3201->3207 3202->3194 3231 5f8db6f-5f8db81 3203->3231 3232 5f8d952-5f8d959 3203->3232 3215 5f8db9d 3204->3215 3207->3194 3215->3215 3231->3203 3231->3204 3236 5f8d95f-5f8da6d 3232->3236 3237 5f8da72-5f8da9d 3232->3237 3236->3231 3237->3231 3241 5f8daa3-5f8db46 3237->3241 3241->3231 3317->3043 3318->3043 3319->3043 3320->3046 3321->3046 3322->3046 3323->3046 3324->3010 3325->3010 3326->3010 3327->3010 3328->3010 3329->3010 3330->3010 3331->3010 3332->3010 3333->3010 3334->3010 3335->3010 3336->3010 3337->3010 3338->3010 3339->3010 3340->3010 3341->3010 3342->3049 3343->3049 3344->3013 3345->3013 3346->3016 3347->3016 3348->3019 3349->3019 3350->3059 3351->3059 3352->3059 3353->3059 3354->3025 3355->3025 3356->3031 3357->3031 3358->3031 3359->3031 3360->3031 3361->2998 3362->2998 3363->2998 3364->3037 3365->3037 3366->3037
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 1c37092c79288cd948e46cd767d5d05130770ef3a3d707be58a078235d16358d
                                                • Instruction ID: 5502a65739f909834088e320f4b6aefc09c547be2ce43d8d15f09b90067d037a
                                                • Opcode Fuzzy Hash: 1c37092c79288cd948e46cd767d5d05130770ef3a3d707be58a078235d16358d
                                                • Instruction Fuzzy Hash: A7525BB5A05228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3367 5f8c976-5f8ca9c 3746 5f8ca9c call 1080040 3367->3746 3747 5f8ca9c call 1080011 3367->3747 3748 5f8ca9c call 1081347 3367->3748 3383 5f8caa2-5f8cb95 3709 5f8cb95 call 10829e8 3383->3709 3710 5f8cb95 call 1082ce8 3383->3710 3711 5f8cb95 call 1082f68 3383->3711 3712 5f8cb95 call 1082e28 3383->3712 3713 5f8cb95 call 1082ec8 3383->3713 3714 5f8cb95 call 108182c 3383->3714 3715 5f8cb95 call 10829e0 3383->3715 3716 5f8cb95 call 1082b58 3383->3716 3717 5f8cb95 call 1082bf8 3383->3717 3718 5f8cb95 call 1082dd8 3383->3718 3719 5f8cb95 call 1082c98 3383->3719 3720 5f8cb95 call 1081918 3383->3720 3721 5f8cb95 call 1082a5f 3383->3721 3722 5f8cb95 call 108301f 3383->3722 3723 5f8cb95 call 1082990 3383->3723 3724 5f8cb95 call 1081970 3383->3724 3725 5f8cb95 call 10818d0 3383->3725 3726 5f8cb95 call 1081d70 3383->3726 3395 5f8cb9b-5f8cbda 3729 5f8cbda call 1083080 3395->3729 3730 5f8cbda call 10830e0 3395->3730 3398 5f8cbe0-5f8cc1f 3731 5f8cc1f call 1083898 3398->3731 3732 5f8cc1f call 10838a8 3398->3732 3401 5f8cc25-5f8cc64 3733 5f8cc64 call 1083b98 3401->3733 3734 5f8cc64 call 1083ba8 3401->3734 3404 5f8cc6a-5f8ccee 3739 5f8ccee call 10844e8 3404->3739 3740 5f8ccee call 1084489 3404->3740 3410 5f8ccf4-5f8cd78 3741 5f8cd78 call 1084a5a 3410->3741 3742 5f8cd78 call 1084910 3410->3742 3743 5f8cd78 call 10848b1 3410->3743 3744 5f8cd78 call 1084c24 3410->3744 3745 5f8cd78 call 1084d87 3410->3745 3416 5f8cd7e-5f8ce02 3749 5f8ce02 call 10856a8 3416->3749 3750 5f8ce02 call 1085707 3416->3750 3751 5f8ce02 call 1085647 3416->3751 3422 5f8ce08-5f8ce8c 3702 5f8ce8c call 1085b88 3422->3702 3703 5f8ce8c call 1085b29 3422->3703 3704 5f8ce8c call 1085be7 3422->3704 3428 5f8ce92-5f8ced4 3705 5f8ced4 call 1085ca8 3428->3705 3706 5f8ced4 call 1085c49 3428->3706 3707 5f8ced4 call 1085f40 3428->3707 3708 5f8ced4 call 1085f94 3428->3708 3431 5f8ceda-5f8cf10 3727 5f8cf10 call 108e639 3431->3727 3728 5f8cf10 call 108ebe0 3431->3728 3434 5f8cf16-5f8cfd7 3735 5f8cfdd call 108fded 3434->3735 3736 5f8cfdd call 108fc80 3434->3736 3737 5f8cfdd call 108fd11 3434->3737 3738 5f8cfdd call 108fbd4 3434->3738 3444 5f8cfe3-5f8d131 LdrInitializeThunk 3465 5f8d453-5f8d781 KiUserExceptionDispatcher 3444->3465 3466 5f8d137-5f8d15b 3444->3466 3563 5f8d787-5f8d8ab 3465->3563 3472 5f8d161 3466->3472 3473 5f8d2b4-5f8d2d8 3466->3473 3472->3473 3474 5f8d167-5f8d2af 3472->3474 3481 5f8d2da 3473->3481 3482 5f8d2de-5f8d2e0 3473->3482 3474->3465 3484 5f8d2dc 3481->3484 3485 5f8d2e2 3481->3485 3486 5f8d2e7-5f8d311 3482->3486 3484->3482 3485->3486 3495 5f8d313 3486->3495 3496 5f8d317-5f8d319 3486->3496 3497 5f8d31b 3495->3497 3498 5f8d315 3495->3498 3499 5f8d320-5f8d326 3496->3499 3497->3499 3498->3496 3499->3465 3502 5f8d32c-5f8d42a 3499->3502 3502->3465 3575 5f8db9f-5f8dbb0 3563->3575 3576 5f8d8b1-5f8d8d4 3563->3576 3579 5f8df0a-5f8df11 3575->3579 3580 5f8dbb6-5f8dbbd 3575->3580 3588 5f8d8da-5f8d94c 3576->3588 3589 5f8db87-5f8db9c 3576->3589 3581 5f8df93-5f8dfae 3579->3581 3582 5f8df17-5f8df88 3579->3582 3584 5f8dbc3-5f8dc23 3580->3584 3585 5f8dc54-5f8dc5b 3580->3585 3582->3581 3584->3579 3586 5f8ddcb-5f8ddd2 3585->3586 3587 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 3585->3587 3586->3579 3592 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 3586->3592 3587->3579 3616 5f8db6f-5f8db81 3588->3616 3617 5f8d952-5f8d959 3588->3617 3600 5f8db9d 3589->3600 3592->3579 3600->3600 3616->3588 3616->3589 3621 5f8d95f-5f8da6d 3617->3621 3622 5f8da72-5f8da9d 3617->3622 3621->3616 3622->3616 3626 5f8daa3-5f8db46 3622->3626 3626->3616 3702->3428 3703->3428 3704->3428 3705->3431 3706->3431 3707->3431 3708->3431 3709->3395 3710->3395 3711->3395 3712->3395 3713->3395 3714->3395 3715->3395 3716->3395 3717->3395 3718->3395 3719->3395 3720->3395 3721->3395 3722->3395 3723->3395 3724->3395 3725->3395 3726->3395 3727->3434 3728->3434 3729->3398 3730->3398 3731->3401 3732->3401 3733->3404 3734->3404 3735->3444 3736->3444 3737->3444 3738->3444 3739->3410 3740->3410 3741->3416 3742->3416 3743->3416 3744->3416 3745->3416 3746->3383 3747->3383 3748->3383 3749->3422 3750->3422 3751->3422
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 755f6aaad09f62031ea747276e99b2b8344dcb2aad2f5816a326ec1d5ef7c3c3
                                                • Instruction ID: 6cb24834bebc2d0966c06eb7b6b840075f0f65a135aabc1b9dd3e61968896c69
                                                • Opcode Fuzzy Hash: 755f6aaad09f62031ea747276e99b2b8344dcb2aad2f5816a326ec1d5ef7c3c3
                                                • Instruction Fuzzy Hash: 2F424BB5A05228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3752 5f8c9b2-5f8ca9c 4084 5f8ca9c call 1080040 3752->4084 4085 5f8ca9c call 1080011 3752->4085 4086 5f8ca9c call 1081347 3752->4086 3765 5f8caa2-5f8cb95 4097 5f8cb95 call 10829e8 3765->4097 4098 5f8cb95 call 1082ce8 3765->4098 4099 5f8cb95 call 1082f68 3765->4099 4100 5f8cb95 call 1082e28 3765->4100 4101 5f8cb95 call 1082ec8 3765->4101 4102 5f8cb95 call 108182c 3765->4102 4103 5f8cb95 call 10829e0 3765->4103 4104 5f8cb95 call 1082b58 3765->4104 4105 5f8cb95 call 1082bf8 3765->4105 4106 5f8cb95 call 1082dd8 3765->4106 4107 5f8cb95 call 1082c98 3765->4107 4108 5f8cb95 call 1081918 3765->4108 4109 5f8cb95 call 1082a5f 3765->4109 4110 5f8cb95 call 108301f 3765->4110 4111 5f8cb95 call 1082990 3765->4111 4112 5f8cb95 call 1081970 3765->4112 4113 5f8cb95 call 10818d0 3765->4113 4114 5f8cb95 call 1081d70 3765->4114 3777 5f8cb9b-5f8cbda 4117 5f8cbda call 1083080 3777->4117 4118 5f8cbda call 10830e0 3777->4118 3780 5f8cbe0-5f8cc1f 4119 5f8cc1f call 1083898 3780->4119 4120 5f8cc1f call 10838a8 3780->4120 3783 5f8cc25-5f8cc64 4121 5f8cc64 call 1083b98 3783->4121 4122 5f8cc64 call 1083ba8 3783->4122 3786 5f8cc6a-5f8ccee 4127 5f8ccee call 10844e8 3786->4127 4128 5f8ccee call 1084489 3786->4128 3792 5f8ccf4-5f8cd78 4129 5f8cd78 call 1084a5a 3792->4129 4130 5f8cd78 call 1084910 3792->4130 4131 5f8cd78 call 10848b1 3792->4131 4132 5f8cd78 call 1084c24 3792->4132 4133 5f8cd78 call 1084d87 3792->4133 3798 5f8cd7e-5f8ce02 4087 5f8ce02 call 10856a8 3798->4087 4088 5f8ce02 call 1085707 3798->4088 4089 5f8ce02 call 1085647 3798->4089 3804 5f8ce08-5f8ce8c 4090 5f8ce8c call 1085b88 3804->4090 4091 5f8ce8c call 1085b29 3804->4091 4092 5f8ce8c call 1085be7 3804->4092 3810 5f8ce92-5f8ced4 4093 5f8ced4 call 1085ca8 3810->4093 4094 5f8ced4 call 1085c49 3810->4094 4095 5f8ced4 call 1085f40 3810->4095 4096 5f8ced4 call 1085f94 3810->4096 3813 5f8ceda-5f8cf10 4115 5f8cf10 call 108e639 3813->4115 4116 5f8cf10 call 108ebe0 3813->4116 3816 5f8cf16-5f8cfd7 4123 5f8cfdd call 108fded 3816->4123 4124 5f8cfdd call 108fc80 3816->4124 4125 5f8cfdd call 108fd11 3816->4125 4126 5f8cfdd call 108fbd4 3816->4126 3826 5f8cfe3-5f8d131 LdrInitializeThunk 3847 5f8d453-5f8d781 KiUserExceptionDispatcher 3826->3847 3848 5f8d137-5f8d15b 3826->3848 3945 5f8d787-5f8d8ab 3847->3945 3854 5f8d161 3848->3854 3855 5f8d2b4-5f8d2d8 3848->3855 3854->3855 3856 5f8d167-5f8d2af 3854->3856 3863 5f8d2da 3855->3863 3864 5f8d2de-5f8d2e0 3855->3864 3856->3847 3866 5f8d2dc 3863->3866 3867 5f8d2e2 3863->3867 3868 5f8d2e7-5f8d311 3864->3868 3866->3864 3867->3868 3877 5f8d313 3868->3877 3878 5f8d317-5f8d319 3868->3878 3879 5f8d31b 3877->3879 3880 5f8d315 3877->3880 3881 5f8d320-5f8d326 3878->3881 3879->3881 3880->3878 3881->3847 3884 5f8d32c-5f8d42a 3881->3884 3884->3847 3957 5f8db9f-5f8dbb0 3945->3957 3958 5f8d8b1-5f8d8d4 3945->3958 3961 5f8df0a-5f8df11 3957->3961 3962 5f8dbb6-5f8dbbd 3957->3962 3970 5f8d8da-5f8d94c 3958->3970 3971 5f8db87-5f8db9c 3958->3971 3963 5f8df93-5f8dfae 3961->3963 3964 5f8df17-5f8df88 3961->3964 3966 5f8dbc3-5f8dc23 3962->3966 3967 5f8dc54-5f8dc5b 3962->3967 3964->3963 3966->3961 3968 5f8ddcb-5f8ddd2 3967->3968 3969 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 3967->3969 3968->3961 3974 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 3968->3974 3969->3961 3998 5f8db6f-5f8db81 3970->3998 3999 5f8d952-5f8d959 3970->3999 3982 5f8db9d 3971->3982 3974->3961 3982->3982 3998->3970 3998->3971 4003 5f8d95f-5f8da6d 3999->4003 4004 5f8da72-5f8da9d 3999->4004 4003->3998 4004->3998 4008 5f8daa3-5f8db46 4004->4008 4008->3998 4084->3765 4085->3765 4086->3765 4087->3804 4088->3804 4089->3804 4090->3810 4091->3810 4092->3810 4093->3813 4094->3813 4095->3813 4096->3813 4097->3777 4098->3777 4099->3777 4100->3777 4101->3777 4102->3777 4103->3777 4104->3777 4105->3777 4106->3777 4107->3777 4108->3777 4109->3777 4110->3777 4111->3777 4112->3777 4113->3777 4114->3777 4115->3816 4116->3816 4117->3780 4118->3780 4119->3783 4120->3783 4121->3786 4122->3786 4123->3826 4124->3826 4125->3826 4126->3826 4127->3792 4128->3792 4129->3798 4130->3798 4131->3798 4132->3798 4133->3798
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 552e55fecbb2ba04e5546ce8d712f9353d09a1da7cc2aecc2264cccde0c494ff
                                                • Instruction ID: ed1c56a3fa2d6a5cfd1022bc98a7aee2aba5e43a0bf597c9e058f7fc5cb471e7
                                                • Opcode Fuzzy Hash: 552e55fecbb2ba04e5546ce8d712f9353d09a1da7cc2aecc2264cccde0c494ff
                                                • Instruction Fuzzy Hash: 13425CB5A05218CFCB24EF30D9596ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4134 5f8c9f7-5f8ca9c 4500 5f8ca9c call 1080040 4134->4500 4501 5f8ca9c call 1080011 4134->4501 4502 5f8ca9c call 1081347 4134->4502 4144 5f8caa2-5f8cb95 4463 5f8cb95 call 10829e8 4144->4463 4464 5f8cb95 call 1082ce8 4144->4464 4465 5f8cb95 call 1082f68 4144->4465 4466 5f8cb95 call 1082e28 4144->4466 4467 5f8cb95 call 1082ec8 4144->4467 4468 5f8cb95 call 108182c 4144->4468 4469 5f8cb95 call 10829e0 4144->4469 4470 5f8cb95 call 1082b58 4144->4470 4471 5f8cb95 call 1082bf8 4144->4471 4472 5f8cb95 call 1082dd8 4144->4472 4473 5f8cb95 call 1082c98 4144->4473 4474 5f8cb95 call 1081918 4144->4474 4475 5f8cb95 call 1082a5f 4144->4475 4476 5f8cb95 call 108301f 4144->4476 4477 5f8cb95 call 1082990 4144->4477 4478 5f8cb95 call 1081970 4144->4478 4479 5f8cb95 call 10818d0 4144->4479 4480 5f8cb95 call 1081d70 4144->4480 4156 5f8cb9b-5f8cbda 4483 5f8cbda call 1083080 4156->4483 4484 5f8cbda call 10830e0 4156->4484 4159 5f8cbe0-5f8cc1f 4485 5f8cc1f call 1083898 4159->4485 4486 5f8cc1f call 10838a8 4159->4486 4162 5f8cc25-5f8cc64 4487 5f8cc64 call 1083b98 4162->4487 4488 5f8cc64 call 1083ba8 4162->4488 4165 5f8cc6a-5f8ccee 4493 5f8ccee call 10844e8 4165->4493 4494 5f8ccee call 1084489 4165->4494 4171 5f8ccf4-5f8cd78 4495 5f8cd78 call 1084a5a 4171->4495 4496 5f8cd78 call 1084910 4171->4496 4497 5f8cd78 call 10848b1 4171->4497 4498 5f8cd78 call 1084c24 4171->4498 4499 5f8cd78 call 1084d87 4171->4499 4177 5f8cd7e-5f8ce02 4503 5f8ce02 call 10856a8 4177->4503 4504 5f8ce02 call 1085707 4177->4504 4505 5f8ce02 call 1085647 4177->4505 4183 5f8ce08-5f8ce8c 4506 5f8ce8c call 1085b88 4183->4506 4507 5f8ce8c call 1085b29 4183->4507 4508 5f8ce8c call 1085be7 4183->4508 4189 5f8ce92-5f8ced4 4509 5f8ced4 call 1085ca8 4189->4509 4510 5f8ced4 call 1085c49 4189->4510 4511 5f8ced4 call 1085f40 4189->4511 4512 5f8ced4 call 1085f94 4189->4512 4192 5f8ceda-5f8cf10 4481 5f8cf10 call 108e639 4192->4481 4482 5f8cf10 call 108ebe0 4192->4482 4195 5f8cf16-5f8cfd7 4489 5f8cfdd call 108fded 4195->4489 4490 5f8cfdd call 108fc80 4195->4490 4491 5f8cfdd call 108fd11 4195->4491 4492 5f8cfdd call 108fbd4 4195->4492 4205 5f8cfe3-5f8d131 LdrInitializeThunk 4226 5f8d453-5f8d781 KiUserExceptionDispatcher 4205->4226 4227 5f8d137-5f8d15b 4205->4227 4324 5f8d787-5f8d8ab 4226->4324 4233 5f8d161 4227->4233 4234 5f8d2b4-5f8d2d8 4227->4234 4233->4234 4235 5f8d167-5f8d2af 4233->4235 4242 5f8d2da 4234->4242 4243 5f8d2de-5f8d2e0 4234->4243 4235->4226 4245 5f8d2dc 4242->4245 4246 5f8d2e2 4242->4246 4247 5f8d2e7-5f8d311 4243->4247 4245->4243 4246->4247 4256 5f8d313 4247->4256 4257 5f8d317-5f8d319 4247->4257 4258 5f8d31b 4256->4258 4259 5f8d315 4256->4259 4260 5f8d320-5f8d326 4257->4260 4258->4260 4259->4257 4260->4226 4263 5f8d32c-5f8d42a 4260->4263 4263->4226 4336 5f8db9f-5f8dbb0 4324->4336 4337 5f8d8b1-5f8d8d4 4324->4337 4340 5f8df0a-5f8df11 4336->4340 4341 5f8dbb6-5f8dbbd 4336->4341 4349 5f8d8da-5f8d94c 4337->4349 4350 5f8db87-5f8db9c 4337->4350 4342 5f8df93-5f8dfae 4340->4342 4343 5f8df17-5f8df88 4340->4343 4345 5f8dbc3-5f8dc23 4341->4345 4346 5f8dc54-5f8dc5b 4341->4346 4343->4342 4345->4340 4347 5f8ddcb-5f8ddd2 4346->4347 4348 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 4346->4348 4347->4340 4353 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 4347->4353 4348->4340 4377 5f8db6f-5f8db81 4349->4377 4378 5f8d952-5f8d959 4349->4378 4361 5f8db9d 4350->4361 4353->4340 4361->4361 4377->4349 4377->4350 4382 5f8d95f-5f8da6d 4378->4382 4383 5f8da72-5f8da9d 4378->4383 4382->4377 4383->4377 4387 5f8daa3-5f8db46 4383->4387 4387->4377 4463->4156 4464->4156 4465->4156 4466->4156 4467->4156 4468->4156 4469->4156 4470->4156 4471->4156 4472->4156 4473->4156 4474->4156 4475->4156 4476->4156 4477->4156 4478->4156 4479->4156 4480->4156 4481->4195 4482->4195 4483->4159 4484->4159 4485->4162 4486->4162 4487->4165 4488->4165 4489->4205 4490->4205 4491->4205 4492->4205 4493->4171 4494->4171 4495->4177 4496->4177 4497->4177 4498->4177 4499->4177 4500->4144 4501->4144 4502->4144 4503->4183 4504->4183 4505->4183 4506->4189 4507->4189 4508->4189 4509->4192 4510->4192 4511->4192 4512->4192
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: e05ad1ba0ed1f331f36cbc93fc8d005cc72bb88ca7ca4b4313923ca6241c67f2
                                                • Instruction ID: 3ab6077f917ee09a2b7f36587b77f222bbd6423f116cad7f8652437038abd78f
                                                • Opcode Fuzzy Hash: e05ad1ba0ed1f331f36cbc93fc8d005cc72bb88ca7ca4b4313923ca6241c67f2
                                                • Instruction Fuzzy Hash: 2D425CB5A05228CFCB24EF30D9996ADB7B6BF49345F1080EAE54993344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4513 5f8cc40-5f8cc64 4832 5f8cc64 call 1083b98 4513->4832 4833 5f8cc64 call 1083ba8 4513->4833 4517 5f8cc6a-5f8ccee 4838 5f8ccee call 10844e8 4517->4838 4839 5f8ccee call 1084489 4517->4839 4523 5f8ccf4-5f8cd78 4815 5f8cd78 call 1084a5a 4523->4815 4816 5f8cd78 call 1084910 4523->4816 4817 5f8cd78 call 10848b1 4523->4817 4818 5f8cd78 call 1084c24 4523->4818 4819 5f8cd78 call 1084d87 4523->4819 4529 5f8cd7e-5f8ce02 4820 5f8ce02 call 10856a8 4529->4820 4821 5f8ce02 call 1085707 4529->4821 4822 5f8ce02 call 1085647 4529->4822 4535 5f8ce08-5f8ce8c 4823 5f8ce8c call 1085b88 4535->4823 4824 5f8ce8c call 1085b29 4535->4824 4825 5f8ce8c call 1085be7 4535->4825 4541 5f8ce92-5f8ced4 4826 5f8ced4 call 1085ca8 4541->4826 4827 5f8ced4 call 1085c49 4541->4827 4828 5f8ced4 call 1085f40 4541->4828 4829 5f8ced4 call 1085f94 4541->4829 4544 5f8ceda-5f8cf10 4830 5f8cf10 call 108e639 4544->4830 4831 5f8cf10 call 108ebe0 4544->4831 4547 5f8cf16-5f8cfd7 4834 5f8cfdd call 108fded 4547->4834 4835 5f8cfdd call 108fc80 4547->4835 4836 5f8cfdd call 108fd11 4547->4836 4837 5f8cfdd call 108fbd4 4547->4837 4557 5f8cfe3-5f8d131 LdrInitializeThunk 4578 5f8d453-5f8d781 KiUserExceptionDispatcher 4557->4578 4579 5f8d137-5f8d15b 4557->4579 4676 5f8d787-5f8d8ab 4578->4676 4585 5f8d161 4579->4585 4586 5f8d2b4-5f8d2d8 4579->4586 4585->4586 4587 5f8d167-5f8d2af 4585->4587 4594 5f8d2da 4586->4594 4595 5f8d2de-5f8d2e0 4586->4595 4587->4578 4597 5f8d2dc 4594->4597 4598 5f8d2e2 4594->4598 4599 5f8d2e7-5f8d311 4595->4599 4597->4595 4598->4599 4608 5f8d313 4599->4608 4609 5f8d317-5f8d319 4599->4609 4610 5f8d31b 4608->4610 4611 5f8d315 4608->4611 4612 5f8d320-5f8d326 4609->4612 4610->4612 4611->4609 4612->4578 4615 5f8d32c-5f8d42a 4612->4615 4615->4578 4688 5f8db9f-5f8dbb0 4676->4688 4689 5f8d8b1-5f8d8d4 4676->4689 4692 5f8df0a-5f8df11 4688->4692 4693 5f8dbb6-5f8dbbd 4688->4693 4701 5f8d8da-5f8d94c 4689->4701 4702 5f8db87-5f8db9c 4689->4702 4694 5f8df93-5f8dfae 4692->4694 4695 5f8df17-5f8df88 4692->4695 4697 5f8dbc3-5f8dc23 4693->4697 4698 5f8dc54-5f8dc5b 4693->4698 4695->4694 4697->4692 4699 5f8ddcb-5f8ddd2 4698->4699 4700 5f8dc61-5f8dda6 call 5f8b700 call 5f8b308 4698->4700 4699->4692 4705 5f8ddd8-5f8deed call 5f8b700 call 5f8b308 call 5f8b350 4699->4705 4700->4692 4729 5f8db6f-5f8db81 4701->4729 4730 5f8d952-5f8d959 4701->4730 4713 5f8db9d 4702->4713 4705->4692 4713->4713 4729->4701 4729->4702 4734 5f8d95f-5f8da6d 4730->4734 4735 5f8da72-5f8da9d 4730->4735 4734->4729 4735->4729 4739 5f8daa3-5f8db46 4735->4739 4739->4729 4815->4529 4816->4529 4817->4529 4818->4529 4819->4529 4820->4535 4821->4535 4822->4535 4823->4541 4824->4541 4825->4541 4826->4544 4827->4544 4828->4544 4829->4544 4830->4547 4831->4547 4832->4517 4833->4517 4834->4557 4835->4557 4836->4557 4837->4557 4838->4523 4839->4523
                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: a27e6b963b7db3d58a2915e50d76b393bd1d7e0d2317f8738d4eb0c3084edaf4
                                                • Instruction ID: 6c8ca836cd076a3f4d4b188009a84fbbf69d5324bc64165593a1b7ba23a5895d
                                                • Opcode Fuzzy Hash: a27e6b963b7db3d58a2915e50d76b393bd1d7e0d2317f8738d4eb0c3084edaf4
                                                • Instruction Fuzzy Hash: 79323BB5A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54993344DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: e8b46185d5045677f2a00a872a1e19a718558aeee69ce231c2c6654cb1753d0a
                                                • Instruction ID: 93e93b04918e8f490a00210e394ac96a70931534bedaa12d72e7b0b679ef4c0a
                                                • Opcode Fuzzy Hash: e8b46185d5045677f2a00a872a1e19a718558aeee69ce231c2c6654cb1753d0a
                                                • Instruction Fuzzy Hash: BF323AB5A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: cdf651e766121ebc81e620dfa31df6f16ad914f827707e9794b9f97e00e04193
                                                • Instruction ID: f276f435142660d70f7011d359512c9405dfc4ba243e6f8b5f87977914dcc4eb
                                                • Opcode Fuzzy Hash: cdf651e766121ebc81e620dfa31df6f16ad914f827707e9794b9f97e00e04193
                                                • Instruction Fuzzy Hash: F0323AB5A05228CFCB24EF30D9596ADB7B6BF48305F2084E9E54993344DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 6f11e0ee8efcc3f44ed07893454464bf8f803d31795178d654188ff5efb34f66
                                                • Instruction ID: 8de520f3c684e3a0be9c583c545a27cb156d9e930bf0ffb34590cb25f8f5d951
                                                • Opcode Fuzzy Hash: 6f11e0ee8efcc3f44ed07893454464bf8f803d31795178d654188ff5efb34f66
                                                • Instruction Fuzzy Hash: E62239B5A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 112ecac19c3f017929951aef0416346c71aad13a19b24c08b9cdd687d7f217f1
                                                • Instruction ID: a2836773ba3825055e786e4710ac81173f7c359290fbebaea66df3ef1492f3f8
                                                • Opcode Fuzzy Hash: 112ecac19c3f017929951aef0416346c71aad13a19b24c08b9cdd687d7f217f1
                                                • Instruction Fuzzy Hash: 852239B5A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB399E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 23b4a2f4b28ee0b13cc3e3ef34bbb2d1558779633e8507dae5fd5af2ab7d58d4
                                                • Instruction ID: db2fa4a705efb444341bb06f904bb30187b8ca01294d3729293260a3b177cb1f
                                                • Opcode Fuzzy Hash: 23b4a2f4b28ee0b13cc3e3ef34bbb2d1558779633e8507dae5fd5af2ab7d58d4
                                                • Instruction Fuzzy Hash: D12239B0A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB398E81CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 9b408ed91d8d01970d5f766e4091c99973fc393a1b087a5fd9bd6e0962f42cc1
                                                • Instruction ID: bb582924904bbd202e1d851be424b3df1242e86e46bab01160acdc982257e517
                                                • Opcode Fuzzy Hash: 9b408ed91d8d01970d5f766e4091c99973fc393a1b087a5fd9bd6e0962f42cc1
                                                • Instruction Fuzzy Hash: 15223AB5A05228CFCB24EF30D9596ADB7B6BF48305F2084E9E54A93344DB399E81CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: d110d5d0e6f40a381f4870ac9e3224ae210897fed7a7fe0e54c123c247efa46c
                                                • Instruction ID: ec0473193a23c6a6684696badf695cf1487d2a32f414112ea6c79e8f02344a29
                                                • Opcode Fuzzy Hash: d110d5d0e6f40a381f4870ac9e3224ae210897fed7a7fe0e54c123c247efa46c
                                                • Instruction Fuzzy Hash: DC2239B5A05228CFCB24EF30D9596ADB7B6BF48305F1084E9E54A93344DB398E81CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: b675f549a80155c4355de0eaf26778b3e736494ee08826993b82509a43582ade
                                                • Instruction ID: f353f87b9bfcc33dcd0b54da9471ef09d4a9a9df3fececcd11c34b5f9a577c5e
                                                • Opcode Fuzzy Hash: b675f549a80155c4355de0eaf26778b3e736494ee08826993b82509a43582ade
                                                • Instruction Fuzzy Hash: CC1238B5A05228CFCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB398E81CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 03a00cba913ea2830cfa211de2aec9b6aec22b6ec53d5d8ba9d0ad2ffa9673b9
                                                • Instruction ID: 47d17005efa840b07b32903c2ad5366786b2ff2c7417885d77236f92d697b437
                                                • Opcode Fuzzy Hash: 03a00cba913ea2830cfa211de2aec9b6aec22b6ec53d5d8ba9d0ad2ffa9673b9
                                                • Instruction Fuzzy Hash: DB1238B1A052288FCB24EF30D9996ADB7B6BF48305F1084E9E54A93344DB398E81CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 3cc2e12066e9ceafab9fc16a982eeedc8663c9feb5e2f61699d03894facbae41
                                                • Instruction ID: 485ac6209558156d2d959063ad97cea6cead854032b6e8722e5728b3a2a09139
                                                • Opcode Fuzzy Hash: 3cc2e12066e9ceafab9fc16a982eeedc8663c9feb5e2f61699d03894facbae41
                                                • Instruction Fuzzy Hash: E51237B5A052288FCB24EF30D9597ADB7B6AF48305F2084E9E54A93344DF398E81CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: f09a21465b19837889eb1aa112cff12d262db0a27d4f66f72561b972655efec7
                                                • Instruction ID: d6c8b927d8fa498ce308a3c4f90902753d8db118ca7f7e80d3812cfc2eac2433
                                                • Opcode Fuzzy Hash: f09a21465b19837889eb1aa112cff12d262db0a27d4f66f72561b972655efec7
                                                • Instruction Fuzzy Hash: E51227B5A052288FCB24EF30D9597ADB7B6AF48305F2084E9E54A93344DF399E81CF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LdrInitializeThunk.NTDLL ref: 05F8D0CB
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionInitializeThunkUser
                                                • String ID:
                                                • API String ID: 243558500-0
                                                • Opcode ID: 2a5d27b0d0c72d3a4f66f72c2c12ead37fa12e59db06db99deab5cb0a1214b6c
                                                • Instruction ID: f237df76dab7460da11201b2da5316399e806209a1543e1041b8d1ba80f81027
                                                • Opcode Fuzzy Hash: 2a5d27b0d0c72d3a4f66f72c2c12ead37fa12e59db06db99deab5cb0a1214b6c
                                                • Instruction Fuzzy Hash: 421226B5A052288FCB24EF30D9597ADB7B6AF48205F2084E9E54A93344DF398E81CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 8f5195f3f65402ffa62d7ffb5963d4ef2c92874461a85e123bfb2c16c42a6cae
                                                • Instruction ID: 18b5551f9513a4dd0e510cacb9da86492afe30fdefd5a2bcd4bbf4c3c253be0b
                                                • Opcode Fuzzy Hash: 8f5195f3f65402ffa62d7ffb5963d4ef2c92874461a85e123bfb2c16c42a6cae
                                                • Instruction Fuzzy Hash: F4B139B5A05218CBCB24EF30C9997ADB7B6BF48305F1084E9E50993340DB399E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 2315edbb3fa09f5fd3b9d8a0b8b977cda64acda05761acbf5792d41e41c1ac68
                                                • Instruction ID: 98ce41585263f5dbba558ceb970fa5fa4c933172886ad2fe454f650226361c46
                                                • Opcode Fuzzy Hash: 2315edbb3fa09f5fd3b9d8a0b8b977cda64acda05761acbf5792d41e41c1ac68
                                                • Instruction Fuzzy Hash: ABB13AB1A05218CBCB24EF30D9997ADB7B6BF48345F2084E9E50993340DB399E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 43b189add8bd145a568677173bc03515bb334f01495a4e54ffd8273aa19b3c6a
                                                • Instruction ID: 0b1c234ba1c92f83b99f46ef69ffec1372ed6fbab68382f14bde3fca0784ba34
                                                • Opcode Fuzzy Hash: 43b189add8bd145a568677173bc03515bb334f01495a4e54ffd8273aa19b3c6a
                                                • Instruction Fuzzy Hash: 85A12AB1A05218CBCB24EF30D9997ADB7B6BF48205F5084E9E50993340DF399E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 54292e16dfe559586d472795599b7ab3738b710ded6b49fca99a5283c0f7e69c
                                                • Instruction ID: ec2f83f8b0329001daec5a161a324ad935aae8d6722a339524c319ccc9ab6336
                                                • Opcode Fuzzy Hash: 54292e16dfe559586d472795599b7ab3738b710ded6b49fca99a5283c0f7e69c
                                                • Instruction Fuzzy Hash: 06A13BB1A05228CBCB24EF30D9997ADB7B6BF48205F5084E9E50993340DF399E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 64e9b3e7a6c581260b4ad50e2d2e85629c7271aac1936936034cac2e67f61cf2
                                                • Instruction ID: 7a9b2a35e5e83671baa03cf32689305566882800caa63a5290dcd30e01486199
                                                • Opcode Fuzzy Hash: 64e9b3e7a6c581260b4ad50e2d2e85629c7271aac1936936034cac2e67f61cf2
                                                • Instruction Fuzzy Hash: C2913AB1A05228CBCB24EF30D99976DB7B6BF88205F5084E9E50993340DF399E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 05F8D5BB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: fac112a86495d13198e6d85d603af226401a962c0aadc43c1ba8fb267d0183f3
                                                • Instruction ID: 0c0f824a3825a1c994f128db5adb1494ee8fa8ecbf456aa8c1ffed184c576684
                                                • Opcode Fuzzy Hash: fac112a86495d13198e6d85d603af226401a962c0aadc43c1ba8fb267d0183f3
                                                • Instruction Fuzzy Hash: D4914CB5A05218CBCB24EF30C9997ADB7B6BF88205F6084E9E54993340DF389E85CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05F8B63B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.591705513.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_5f80000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: b211666158f392226c44e20147b75406c84b9e254c36528d9d3775fcd3e4fd3a
                                                • Instruction ID: 40cc7935649c12b4308debfe0c09852bf39abc8abfa0b22f4d299431c37b710f
                                                • Opcode Fuzzy Hash: b211666158f392226c44e20147b75406c84b9e254c36528d9d3775fcd3e4fd3a
                                                • Instruction Fuzzy Hash: 6F5144B1D102188FDB14DFA9C899BEDBBB1BF48314F14846AE816BB394D7789844CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02D252A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: ecb49f6566cfaae23a3d2b0f3dade34baa62c498c12ce11bf602c56722e1866a
                                                • Instruction ID: 594bbd6b06bdaa2d3cc8b4acf5936718d07a5ecfd3669c8c61d821397e25e511
                                                • Opcode Fuzzy Hash: ecb49f6566cfaae23a3d2b0f3dade34baa62c498c12ce11bf602c56722e1866a
                                                • Instruction Fuzzy Hash: F65100B1D103189FDF14CFAAD984ADEBBB1BF58314F64812AE819AB350D774A845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02D252A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 21dbbcf4a41934b726e9d7613661f7f92b78dcb62505c08fefe8fdc62a393797
                                                • Instruction ID: 720be197d943bb086382c5b8858acf24893d9aac24e4b6b0add0cce1112669d1
                                                • Opcode Fuzzy Hash: 21dbbcf4a41934b726e9d7613661f7f92b78dcb62505c08fefe8fdc62a393797
                                                • Instruction Fuzzy Hash: E541F1B1D103189FDF14CF99D984ADEBBB5BF48314F64812AE819AB350D774A845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 02D27D01
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: dcd326abaa1deafc973a276195e61546625f6e65a218f3626b7f601077f6a516
                                                • Instruction ID: 927a77461ed928ae016f3550ff5c55bbcee009974a0eabdb2098df23848de77b
                                                • Opcode Fuzzy Hash: dcd326abaa1deafc973a276195e61546625f6e65a218f3626b7f601077f6a516
                                                • Instruction Fuzzy Hash: C7414AB5A00215DFDB24CF99C488AAAFBF5FF88318F148458E419AB361C774A845CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 02D2C442
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID:
                                                • API String ID: 2118026453-0
                                                • Opcode ID: d2d484ee12f2ccf4a7d07e1707fcdbed9edc2cbfd4068010637c52dd698c0bda
                                                • Instruction ID: cd94481b16cd094637cfd4e6f8f44a9190fa167e4b403a60ce5253cafb19510b
                                                • Opcode Fuzzy Hash: d2d484ee12f2ccf4a7d07e1707fcdbed9edc2cbfd4068010637c52dd698c0bda
                                                • Instruction Fuzzy Hash: 6D31AF758153448FDB10DF68E90939E7FF4AF56318F04806AD444A7341C7B9A809CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D26DFF
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 3412a986be3e9625b289703ecc87fc54303d61cad3b1315a92c28042665c0667
                                                • Instruction ID: 7a1b4294c6af6415b8d3c965e50ed6bfef3fcd5dd3c032006115de35f0744023
                                                • Opcode Fuzzy Hash: 3412a986be3e9625b289703ecc87fc54303d61cad3b1315a92c28042665c0667
                                                • Instruction Fuzzy Hash: CB21E4B59002089FDF10CF9AD984BDEBBF9FB48324F14841AE914A7750D379A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D26DFF
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: d7c0069cd1f4c303d2bf4cdc5f21388955baa3cb29d7b9a73e6be7ab583e3e3b
                                                • Instruction ID: 9dad7bfe28951b0220b5e76f93014d3c3a6f631b236e96cb2679347a463d0811
                                                • Opcode Fuzzy Hash: d7c0069cd1f4c303d2bf4cdc5f21388955baa3cb29d7b9a73e6be7ab583e3e3b
                                                • Instruction Fuzzy Hash: AF21F5B59002089FDB10CF9AD984ADEBBF9FB48324F14841AE914A7750D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 02D2C442
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.586354636.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2d20000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID:
                                                • API String ID: 2118026453-0
                                                • Opcode ID: 6b6e25af9186571758497fdd81d22dd959d7eeea41b32f7e9703e3f6ba601cc8
                                                • Instruction ID: b28777808e00d4b5a5ea5d71f89f09fd531637e37cc7ea2094cf102d524385c2
                                                • Opcode Fuzzy Hash: 6b6e25af9186571758497fdd81d22dd959d7eeea41b32f7e9703e3f6ba601cc8
                                                • Instruction Fuzzy Hash: D41189709113048FDB20DFA9D90879FBBF4EB49328F14842AD405B3740CB79A949CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \
                                                • API String ID: 0-2967466578
                                                • Opcode ID: da6aab546d68f643f870df315dc276e777158ed8fe8182fb80db0d868b83f682
                                                • Instruction ID: 467b8b0fd1895cf02947f10055923bebb1d072d37f3117cb645e4af6b932b2fa
                                                • Opcode Fuzzy Hash: da6aab546d68f643f870df315dc276e777158ed8fe8182fb80db0d868b83f682
                                                • Instruction Fuzzy Hash: 9341E371B083455FD706EB7888007AEBBF5AF85744F1580AAE584CB292EB34DC068791
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c715c7c26a9447b63e10932aa0bc2c9324722dc3adff475576386e3f9900307
                                                • Instruction ID: f1b2b3c956810f7dc00c860286b9f47d5d2ef3555ed70209c9af1dc140b90373
                                                • Opcode Fuzzy Hash: 5c715c7c26a9447b63e10932aa0bc2c9324722dc3adff475576386e3f9900307
                                                • Instruction Fuzzy Hash: A3F10930F081154BDF75AA7CC8947AE7BE6EF85214F200876E8C9DB392DA69DC41C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9708fbd48cf2f8f2d5905dc3a7cb25ae5be8cc2e82d21b1e30f09dc9c8e2c102
                                                • Instruction ID: 29c42d45d3faf70c263724d3c8245150fbbd44d1e31bb8f4f1ad7282ad26eee7
                                                • Opcode Fuzzy Hash: 9708fbd48cf2f8f2d5905dc3a7cb25ae5be8cc2e82d21b1e30f09dc9c8e2c102
                                                • Instruction Fuzzy Hash: C3D1AE30B042098FCB55EFB8D9597AE7BF2AF89214F1484A9E485DB395EB39DC01CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f638175cf9fb6ce50f91aba1c410cae296ca4d85c9ce31aa3a4290e83a31ba9
                                                • Instruction ID: d38b3833026fab80adbbb099371bd16292d83004b1b82d90316e50c7fdc58df0
                                                • Opcode Fuzzy Hash: 1f638175cf9fb6ce50f91aba1c410cae296ca4d85c9ce31aa3a4290e83a31ba9
                                                • Instruction Fuzzy Hash: A4C11335B042158FC725EB78D8547AEBBE6AF85204F08846AE496CB785CF38DC06CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b052a8f88b2683cd104de6071275c9845c21e744ef3788e0a5939810a60d362a
                                                • Instruction ID: a9f1de1ac1039736069abf50a697fddfd23003dd0b9c9eed79633bf95309b42a
                                                • Opcode Fuzzy Hash: b052a8f88b2683cd104de6071275c9845c21e744ef3788e0a5939810a60d362a
                                                • Instruction Fuzzy Hash: 9CC1F334708605CFC701DB68C980AAABBE6EF85314F1585A6D9D4CBB52D734EC16CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30848f7d4fe3b1bc0f09b2e8f0fa385889493814f9ca4ba803fb8de722f277cc
                                                • Instruction ID: 61d640b19f2aa84ec3176897ed786f803e2a0be7b6e4fc8c59c6b9654956dcc6
                                                • Opcode Fuzzy Hash: 30848f7d4fe3b1bc0f09b2e8f0fa385889493814f9ca4ba803fb8de722f277cc
                                                • Instruction Fuzzy Hash: C5A1EF35B083448FDB55AB78885829E7BF2AF86204F1484A9E485CB396EF39DC06CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1114cc8fb0ea9fc5c17bf65f0b13c711371993875ee9e869cee52a05a18dd35d
                                                • Instruction ID: 42ea3cc9b39d3ead1ee65ce366768a4c8ea25023f17449fa2331f00d87dda733
                                                • Opcode Fuzzy Hash: 1114cc8fb0ea9fc5c17bf65f0b13c711371993875ee9e869cee52a05a18dd35d
                                                • Instruction Fuzzy Hash: 73A19C34B002059BDB60AF74D859BAD7BE2EF84325F208629E9959B3D4DF398C41CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c41044ed374232758ae76f52b0bf0a4a24411410ec3eee57f497b950a3f851ef
                                                • Instruction ID: 98cf8472e9ff9ada7bb78d4b157204470e69f22be5f74d9c456a024811baf84f
                                                • Opcode Fuzzy Hash: c41044ed374232758ae76f52b0bf0a4a24411410ec3eee57f497b950a3f851ef
                                                • Instruction Fuzzy Hash: 30910830F042089FDB246BB8C8543AEBAE7EFC9314F108969E199DB395DF794C058B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ffb40cf615f18d37f5cb9f7e60829620018e50e6edd493943f7a7485f76c8e9
                                                • Instruction ID: 700b0975d03c48d1bf6c10cd5759d87f75a3d29a740e197cf66ee9177756d7ed
                                                • Opcode Fuzzy Hash: 2ffb40cf615f18d37f5cb9f7e60829620018e50e6edd493943f7a7485f76c8e9
                                                • Instruction Fuzzy Hash: 5491BB317001149FCB19EF68C864AAE7BA7AF88354F44C469F5868B395CF74DD06CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 23c7f40377786a72bd4964b3fb2c87ab7bb03f9895daa2fa160678f20e19c968
                                                • Instruction ID: 7f9e7bd47933c2f3309df3328b3ad12ba87b9c83c6f8a71853e0f6c434b69aaa
                                                • Opcode Fuzzy Hash: 23c7f40377786a72bd4964b3fb2c87ab7bb03f9895daa2fa160678f20e19c968
                                                • Instruction Fuzzy Hash: B2818835B002048FDB64ABB4D91876E7AE3AFC8344F244479E986DB395EF39CC028751
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4b27e7315350cda60ef3e38bca30085be5ff9972738509ed26d42afd25e5718
                                                • Instruction ID: b4cdb36ae70ad80462c3b2a615eced5263fc61afcd77f518e0aa59cf81906558
                                                • Opcode Fuzzy Hash: e4b27e7315350cda60ef3e38bca30085be5ff9972738509ed26d42afd25e5718
                                                • Instruction Fuzzy Hash: 6CA1AF71A08249DFCF05DFA8C845ADEBFF2BF89300F148156E885AB369D734A955CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e72f2c0810fd5f8f5035622d914928bf7f7ea98d0eff78b4cbdd571c3f06794c
                                                • Instruction ID: 6843e3577bb96df7857c5e51bb643688295ce60afbf00ca70f15fa8e30ef52ed
                                                • Opcode Fuzzy Hash: e72f2c0810fd5f8f5035622d914928bf7f7ea98d0eff78b4cbdd571c3f06794c
                                                • Instruction Fuzzy Hash: 13817A307182058FDB55EF6DC884BAD7BE5AF89305B1A40A9E981CB3B1DB76DC81CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c07539645e22677a263e4c0fe85e1d0ce0f2def7095b28d6de1e482c0ef300c9
                                                • Instruction ID: 26867ea22f31244aea8bcc1040c1b19ee3f03fcf452968c6eac58514c17679e6
                                                • Opcode Fuzzy Hash: c07539645e22677a263e4c0fe85e1d0ce0f2def7095b28d6de1e482c0ef300c9
                                                • Instruction Fuzzy Hash: D8718435B002048BDB64ABB8D95876E76E3AFC8344F244439E946DB394EF789C028B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9454359e5d81aaecb8e845952f2a971c25e1f133cfcfb8ea7e54822ed7e821ee
                                                • Instruction ID: 747b872454ecbc4be55710e2b320fa272c4c287d0890cbe3c9ea8e8955bcd7ff
                                                • Opcode Fuzzy Hash: 9454359e5d81aaecb8e845952f2a971c25e1f133cfcfb8ea7e54822ed7e821ee
                                                • Instruction Fuzzy Hash: 3B71C034B042058FCB65AF74C95826E7BE2AFC5604B148879E486DB399EF39DD06CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0dfef3ab3d38f3ef0a15effa63049e972337aa516ffef998da0b3917e7e664e3
                                                • Instruction ID: 07d3eb5afc2414e1b3c41132b9d0b33082ddf5263f56f80b44fb586d4b01d378
                                                • Opcode Fuzzy Hash: 0dfef3ab3d38f3ef0a15effa63049e972337aa516ffef998da0b3917e7e664e3
                                                • Instruction Fuzzy Hash: 92619D70E083498FDB16DFA9C5407AEBBF2AF89300F208659E995AB346D770A945CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 598c6a0b3c902675c39d8f7f508a004eb91549f962f73d4023f2369c0af452c2
                                                • Instruction ID: f3b62fb93e228f747f09362c73d2220eb55851e92681ee241a5ec8f2dd289c03
                                                • Opcode Fuzzy Hash: 598c6a0b3c902675c39d8f7f508a004eb91549f962f73d4023f2369c0af452c2
                                                • Instruction Fuzzy Hash: 5C518271A0D3859FC742ABB8C8546E97FB2AF4B304F1580E6D184DB793DA399C0AC761
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5964ffc123e5cca717ab8ccc1cfaa39ea20f7df40db6caf81544a2272a47c99a
                                                • Instruction ID: db5e3e9cd5f81b0b1c0686a39ba06f8cf94b9131df07c5c16a0dd64bf30a7060
                                                • Opcode Fuzzy Hash: 5964ffc123e5cca717ab8ccc1cfaa39ea20f7df40db6caf81544a2272a47c99a
                                                • Instruction Fuzzy Hash: BF61C574D00218DFCB64EFB4D859A9DBBB2FF48311F20846AE54AA7354DB399941CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 71605810ba077ad0b680314d5ce6b3832b0805af95f96cac2d26803bd04bc4a5
                                                • Instruction ID: 043b0132ebdfcaae0bc8782c48d5671d63a3c39919ac575e8e3334c1b4eceef5
                                                • Opcode Fuzzy Hash: 71605810ba077ad0b680314d5ce6b3832b0805af95f96cac2d26803bd04bc4a5
                                                • Instruction Fuzzy Hash: A0518C74E043489FDB60AF74D91879EBBF2AF49200F1084AAE946DB395EB398D41CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6850344f0bb7b8f9a149046784211d428970f3562080158e060e5d2576427ea8
                                                • Instruction ID: 6c9891cdc4f81b64fcd8e5ba74bc84971cb9297109679abe219509d02a3a11b2
                                                • Opcode Fuzzy Hash: 6850344f0bb7b8f9a149046784211d428970f3562080158e060e5d2576427ea8
                                                • Instruction Fuzzy Hash: C4519071E0478D8FDF16CFA9C54079DBBF2AF8A300F248659E994AB246D770A981CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 173dea7237aa618c1b138c14a79826f97d248ac9b769abbba2e609234bf5c246
                                                • Instruction ID: 56527761dfee34c502f09344f9bd1c793e7d13db8b5cb4692b25c4020d501bd5
                                                • Opcode Fuzzy Hash: 173dea7237aa618c1b138c14a79826f97d248ac9b769abbba2e609234bf5c246
                                                • Instruction Fuzzy Hash: DB418535B102148FDB64AB74D81876E7AE7AF88744F244439E986DB385DF788C018B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 79da75c39349760ff544ee545aab4afa88d1188845d6fdb5d2797f338fc2875a
                                                • Instruction ID: 4d0a6aed2b97668a9173e297bb533722b8ae5d56bc9f7241c6775c0dba85e435
                                                • Opcode Fuzzy Hash: 79da75c39349760ff544ee545aab4afa88d1188845d6fdb5d2797f338fc2875a
                                                • Instruction Fuzzy Hash: 3B41BF31A08249DFCF16DFA8C841ADDBFB2AF49350F148151F995AB2A9D334E911CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 83f3e1148fe2ec2610b413a3d2fcc9dccc6516d67928d11e6938ad3f223fd123
                                                • Instruction ID: befba2de622dcf9c88c0d57233c4e0f9b419ab14b807fd82356ec5e76a9b69ac
                                                • Opcode Fuzzy Hash: 83f3e1148fe2ec2610b413a3d2fcc9dccc6516d67928d11e6938ad3f223fd123
                                                • Instruction Fuzzy Hash: 87318175B042458FC742EF78DC457AE7BF2AF8A214F1584A9E589D7396EB388C018B60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 50431e9361a6aff3a599deec74ff2967d900a247b10379b9cb1503e2ebe17ef9
                                                • Instruction ID: 9699aceb0ffa0a27989eb41b4100c41797519784c83282e59e649615fcaaa576
                                                • Opcode Fuzzy Hash: 50431e9361a6aff3a599deec74ff2967d900a247b10379b9cb1503e2ebe17ef9
                                                • Instruction Fuzzy Hash: 3E31C275B092568FC742EB7CDC4179D7BF1AF89314F0584A5D548DB396EB388C028BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d951c2246581663b7ba0ba54d4cbf9c267f1ceb120821db6ce9adf84df50290f
                                                • Instruction ID: 7a57c1c9e2e3eed90d1b5116c752b6af4d0a7dd2729319e0916b4c0c3e665c04
                                                • Opcode Fuzzy Hash: d951c2246581663b7ba0ba54d4cbf9c267f1ceb120821db6ce9adf84df50290f
                                                • Instruction Fuzzy Hash: 422127317086148FC712AB2C9808B6EBBE2AF85310F85C1AAE8D5CF392DB30DC41C791
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8655ee8773237ac92fa12c9fe9edf43ad6939898f6c806a9c279d994160b9adc
                                                • Instruction ID: 0d767bb7e71c9c3127cb876759f3041d61adc22cd3d65e0faaa196da0cc32a78
                                                • Opcode Fuzzy Hash: 8655ee8773237ac92fa12c9fe9edf43ad6939898f6c806a9c279d994160b9adc
                                                • Instruction Fuzzy Hash: 70212535B083945FD7126B78982879E7FF19F82300F1585BAE884DB3C2DE388C058791
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12b41e93a777c45eab1e2f405f01f2acedacd9841aa1bb682382ef4d2f26abda
                                                • Instruction ID: d3d259af5abec8fda45bb70bda63f5ee2bccab08c2a9cbacbff50b90433f2b05
                                                • Opcode Fuzzy Hash: 12b41e93a777c45eab1e2f405f01f2acedacd9841aa1bb682382ef4d2f26abda
                                                • Instruction Fuzzy Hash: 9721483560D3C04FD747A778982465A7FB59F93204F5AC0E7D0C8CBAA3E6298C0AC721
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585199729.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_101d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 314d81c63bd14e64c6a226b1463a3d7376b05da4ea1e1bbfc5e5b956467ef1f2
                                                • Instruction ID: 9b5227dfc2805a0e6ed93ddeb54a32b70c215d5540db03b7733258115dea78fd
                                                • Opcode Fuzzy Hash: 314d81c63bd14e64c6a226b1463a3d7376b05da4ea1e1bbfc5e5b956467ef1f2
                                                • Instruction Fuzzy Hash: 63212871500240DFDF41DF54D9C4B1ABFA5FB88328F2489A9E8454B24AC33AD856C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585199729.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_101d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07f529f115ffff001e4f18d2b9c98d58018a7321052f2b6b99c36c12638c61b9
                                                • Instruction ID: e9982eae2135339c121b3dc3ec5b7c1145c3a6186067a1da30ddf34e2745123e
                                                • Opcode Fuzzy Hash: 07f529f115ffff001e4f18d2b9c98d58018a7321052f2b6b99c36c12638c61b9
                                                • Instruction Fuzzy Hash: 5D213671540200DFDB11DF54D9C4B67BBA1FB84324F2085A8E8450B20AC73AE85AC7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585243953.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_102d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0ab36c2cb443d5097b75c1df0acf2b34923a3b886580dfb128ab7c53ebf7a13
                                                • Instruction ID: db16f1e9a26783ccc24a8143ab6312c1a1061f12639337938de769ec980776a2
                                                • Opcode Fuzzy Hash: d0ab36c2cb443d5097b75c1df0acf2b34923a3b886580dfb128ab7c53ebf7a13
                                                • Instruction Fuzzy Hash: A4212571604240DFCB51DFA4D9C0B16BBA5FB84354F20C9A9E8894B756C33ADC4BCBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d27c736c7aa818ada5f94c5b02c1f3dbe17330e8b2e42dd496c424787074f36d
                                                • Instruction ID: ea5dce3cb792c4bbfa01685d292e4f3b3bc1b5b13bbd786a8423ae6c22d41a1a
                                                • Opcode Fuzzy Hash: d27c736c7aa818ada5f94c5b02c1f3dbe17330e8b2e42dd496c424787074f36d
                                                • Instruction Fuzzy Hash: C0218270B04209DBEB14EFA5D844BAEBFB5BF44304F10442AE981B7748DB74DA45CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 726d92e70195ca6533258688368b161077eb4821ef9dc748b298628632cdd4b3
                                                • Instruction ID: 7cd5b6a0bead02f51dc6133adb54d55b5e2ce4f26daeb78155a1eed31cf7a515
                                                • Opcode Fuzzy Hash: 726d92e70195ca6533258688368b161077eb4821ef9dc748b298628632cdd4b3
                                                • Instruction Fuzzy Hash: F3118131B0411857CB14BBB898296DE76A6ABC8755B104978E482EB384EF39CD058B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585243953.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_102d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b65dca9c5016cbaf9b20ff554ce8b4fc4707ab48d15e93b2247af2c5fc095ec
                                                • Instruction ID: a41cf7695b89f58a1a54cbea9ca9167b620bb265680464f38fa86423d25a4ef5
                                                • Opcode Fuzzy Hash: 8b65dca9c5016cbaf9b20ff554ce8b4fc4707ab48d15e93b2247af2c5fc095ec
                                                • Instruction Fuzzy Hash: 5D2180755083809FCB12CF64D9D4B11BFB1EB46214F28C5DAD8858B667C33A985ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: afed37b78de4547ad616d0be83908ddeeded0e43c4b73dcd17f5cf5ef46adde7
                                                • Instruction ID: 301c720835701e49ea37a99c869d6fecd952d02b8d068664b56030bd985c1cae
                                                • Opcode Fuzzy Hash: afed37b78de4547ad616d0be83908ddeeded0e43c4b73dcd17f5cf5ef46adde7
                                                • Instruction Fuzzy Hash: B1110631608205DBDB15DF68C882B9EBBE2AF85324F24C655D9D46B29AD370F810C7A6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 27427eb64396e0f8b8619c3cd6e56d52183f017aca1125bbd1b8f4550f9e7bbd
                                                • Instruction ID: 1cd993e58dbe9ab9a7c6c8d0e500c9e572bd55385fb397874b9e5a69020733bc
                                                • Opcode Fuzzy Hash: 27427eb64396e0f8b8619c3cd6e56d52183f017aca1125bbd1b8f4550f9e7bbd
                                                • Instruction Fuzzy Hash: 96212974E002588BDF20EFB4D9696ADBBB1BF88300F5084ADE545AB345EF395945CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d832d85a7991cc6dd22b627c90f7e73adb47b419c50eb36c9523153a8b012beb
                                                • Instruction ID: bb1b437cc6a6ffcaed4c4b4a407ea61ee388358ba6e18bb7579da0bd7c4a7885
                                                • Opcode Fuzzy Hash: d832d85a7991cc6dd22b627c90f7e73adb47b419c50eb36c9523153a8b012beb
                                                • Instruction Fuzzy Hash: 23115E70A162498FCB05DFB8E4646DCBFB2EF49715F24409AE085EB392CB754D09CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585199729.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_101d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1193202f6d84514e7bee289ffa5d34f3f61fc8f37f39928f4f0d259a97e51c54
                                                • Instruction ID: 4d748698acef79d885b9a6a9141ab78b7c4c8b1f0a940906e583edcf6bd66842
                                                • Opcode Fuzzy Hash: 1193202f6d84514e7bee289ffa5d34f3f61fc8f37f39928f4f0d259a97e51c54
                                                • Instruction Fuzzy Hash: 9811D376504280CFCB42DF54D5C4B16BFB2FB88324F24C6A9D8494B61AC33AD55ACBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585199729.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_101d000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1193202f6d84514e7bee289ffa5d34f3f61fc8f37f39928f4f0d259a97e51c54
                                                • Instruction ID: 009929b91ce1b06ca1606ba9df220e1413cdced7c774aef6a8fc7a9517ab3e2b
                                                • Opcode Fuzzy Hash: 1193202f6d84514e7bee289ffa5d34f3f61fc8f37f39928f4f0d259a97e51c54
                                                • Instruction Fuzzy Hash: 0611BE76504280CFDB12CF54D9C4B16BFB1FB84324F28C6A9D8454B61BC33AD45ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eed8587fdc871737576d5b8bc479a712903a72f6335dceffb061724c094d3701
                                                • Instruction ID: 1014a14b313bebd67ff6073a4422dd4c861532a2461a1233955aef4a44a54a8d
                                                • Opcode Fuzzy Hash: eed8587fdc871737576d5b8bc479a712903a72f6335dceffb061724c094d3701
                                                • Instruction Fuzzy Hash: 0111ED35B0C3824FD752A739DC207663BE24B97204F1980FAD5C8CB2A3EA64CC0A8360
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 811f62a92f2931b06fa1700f904daaa79b0c85512b426c26ad7c9cb7786745cd
                                                • Instruction ID: 919c4822368d17fe4d64f6e3a08f5a254c0ca0af5cf64e3b82f53a3b2ae596de
                                                • Opcode Fuzzy Hash: 811f62a92f2931b06fa1700f904daaa79b0c85512b426c26ad7c9cb7786745cd
                                                • Instruction Fuzzy Hash: D7110470F14218DBDB18DFA8D84079EBBB2BF80304F10482AD981AB388DF74C945CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26abc6d0d4e25a2a713c74563f7fd47f26aa2740e3713f80eba8bc56fda3a0cc
                                                • Instruction ID: 3582869ba16a46e2edf39f9ba4e4ce3b7725592176b3eb0acb6f836255f8386f
                                                • Opcode Fuzzy Hash: 26abc6d0d4e25a2a713c74563f7fd47f26aa2740e3713f80eba8bc56fda3a0cc
                                                • Instruction Fuzzy Hash: 9A115235F001198F8B50EF7DDC559AE77F1BB8C2147508469E149E7354EB389D028F91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cab10e4518e6c97aaeb60cbe1e5bc4e118f92e3cfb7e3252cd60e6997e13e3be
                                                • Instruction ID: 2668b89213cf9dfa764e13cc726927e3f2f56a0119916d2cc272a71151893fe6
                                                • Opcode Fuzzy Hash: cab10e4518e6c97aaeb60cbe1e5bc4e118f92e3cfb7e3252cd60e6997e13e3be
                                                • Instruction Fuzzy Hash: C9110C75F002198F8B50FFBDDC95A9EB7F6BB882107508469E549E7344EB389D028BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 70a42826eaaa19824f9f9559ef6b09bc52749f3c25f1eeca42ceb29efae34e05
                                                • Instruction ID: 7138c514474d3d8d1354bd547be87b7c3926ca17c752f55132bc4aab9913de6f
                                                • Opcode Fuzzy Hash: 70a42826eaaa19824f9f9559ef6b09bc52749f3c25f1eeca42ceb29efae34e05
                                                • Instruction Fuzzy Hash: E4014732B0011857DB1266B8991939E3AA36F88710F010579E9C2E7390FF3D8D018381
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 040f0dd4bdf7338f0bfb2ebf20ba69d26894717c1672cdca7006f83444fb7328
                                                • Instruction ID: 5c324061ee3023a4b8bc798e900cf52aea6628d077183a34127163037ac1db24
                                                • Opcode Fuzzy Hash: 040f0dd4bdf7338f0bfb2ebf20ba69d26894717c1672cdca7006f83444fb7328
                                                • Instruction Fuzzy Hash: 99015371A0025C8FCF09CF98D9009DDBBB6FF89310F00816AE945AB264D7359919CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 13f1d0655cae12f6978ddeaedf6609bdead3ebb338d031e38d8a8c8ea45af0d4
                                                • Instruction ID: e28b5ce49c160710bc1fe06c8288539ef7f8a65d2cd293b17e5cfc21b42c821b
                                                • Opcode Fuzzy Hash: 13f1d0655cae12f6978ddeaedf6609bdead3ebb338d031e38d8a8c8ea45af0d4
                                                • Instruction Fuzzy Hash: 3CE0ED35F001298F8F50FBB9D8A55DDB3E2EFC8225B108065E546E7354DE389C168BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54fd458f1634bd595244d4625947e8aa68066cb7d5b9af623baf734ee6bc773c
                                                • Instruction ID: 479b13f0119fb3341808c270e976986b07b0768133b9bbf5d1930933dd83ee39
                                                • Opcode Fuzzy Hash: 54fd458f1634bd595244d4625947e8aa68066cb7d5b9af623baf734ee6bc773c
                                                • Instruction Fuzzy Hash: CAE0ED35F001248B8F50FBB9D8A54DD73F2FFCC225B1044A5E546E7394DE289D158BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8f8142c1be3dd02ee2e1411ade010adde8d9f5418a07152b777e7d840a17757
                                                • Instruction ID: 62d95470be2a948dc418ade1834244eff25a95b6aedec40418ffdf4c0558103c
                                                • Opcode Fuzzy Hash: d8f8142c1be3dd02ee2e1411ade010adde8d9f5418a07152b777e7d840a17757
                                                • Instruction Fuzzy Hash: E8E0C935F001248F8F54FBB9D8A55DDB3E2EBC8225B108065E54AE7354DA289C168BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91670dffcb7b70c383ff4d3bb5ee3d56290ef3722eaf70243d811830c9b7338f
                                                • Instruction ID: fb7ccd738b95dd34cf97c98ba61ef0a891d3be4848d852ab021702a30fe5dfa4
                                                • Opcode Fuzzy Hash: 91670dffcb7b70c383ff4d3bb5ee3d56290ef3722eaf70243d811830c9b7338f
                                                • Instruction Fuzzy Hash: 93E0C935F001288B8F50EBB9D8A54DD73E2EBC8229B508065E54AE7354DA289C168BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e26f54f6f6dd6509e866f99deec6e8a3d6ed9ae295ee43374fadaf02d2ee9998
                                                • Instruction ID: cd7eca310898530c500eb61d11ab3ca84a659061ca97e5e9f0fb98e9f6001075
                                                • Opcode Fuzzy Hash: e26f54f6f6dd6509e866f99deec6e8a3d6ed9ae295ee43374fadaf02d2ee9998
                                                • Instruction Fuzzy Hash: 63E0CD2134530B17E7449079989073979D69BD1170B48C275E5888B681D818D8049365
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c35bf42aba340661a1bf77941b5a4634ef573e480d051a79e7c7eec937d5391c
                                                • Instruction ID: 46b048112877a06a97f2d2e304e3d892d2dbcb8e4c8980fbae67d244db90f37e
                                                • Opcode Fuzzy Hash: c35bf42aba340661a1bf77941b5a4634ef573e480d051a79e7c7eec937d5391c
                                                • Instruction Fuzzy Hash: FFE0863AB150248FC744DB74B8885AC7BA6EBCC111B18C57BFA5AD3344DF348C068B40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.585336947.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_1080000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f88fceaf53f4ad76a81b3f2d4a4bf4364fece6a837153e76aa9990eeeee4430
                                                • Instruction ID: 6fdece2841d55873d7d172583ff85548dcfb46278adc59047074b2d2eef71652
                                                • Opcode Fuzzy Hash: 5f88fceaf53f4ad76a81b3f2d4a4bf4364fece6a837153e76aa9990eeeee4430
                                                • Instruction Fuzzy Hash: C2D022007002074A4F1822BB06203BE30C30BA00DAB800C765882CFFC5FE2CC88C2352
                                                Uniqueness

                                                Uniqueness Score: -1.00%