Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
Analysis ID:756011
MD5:277a9cd8ef361888eb41a6b7d0d94e26
SHA1:9b703e613307793cd9f0309eb458d5f12f8400dd
SHA256:8cdfbe67b609226da852adf3db3098941cffda7cea7443b935e1eed5fdae0bf3
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail2.bpk-spb.ru", "Username": "grafkina.gg@sasta.ru", "Password": "SGZ3574344"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x31cfe:$a13: get_DnsResolver
          • 0x303f3:$a20: get_LastAccessed
          • 0x3272c:$a27: set_InternalServerPort
          • 0x32a61:$a30: set_GuidMasterKey
          • 0x30505:$a33: get_Clipboard
          • 0x30513:$a34: get_Keyboard
          • 0x318f8:$a35: get_ShiftKeyDown
          • 0x31909:$a36: get_AltKeyDown
          • 0x30520:$a37: get_Password
          • 0x31053:$a38: get_PasswordHash
          • 0x32160:$a39: get_DefaultCredentials
          Click to see the 11 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.28b0724.2.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.28b0724.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPasteDetects executables potentially checking for WinJail sandbox windowditekSHen
            • 0xd16e:$v1: SbieDll.dll
            • 0xd188:$v2: USER
            • 0xd194:$v3: SANDBOX
            • 0xd1a6:$v4: VIRUS
            • 0xd1f6:$v4: VIRUS
            • 0xd1b4:$v5: MALWARE
            • 0xd1c6:$v6: SCHMIDTI
            • 0xd1da:$v7: CURRENTUSER
            1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x34a40:$s10: logins
                • 0x344ba:$s11: credential
                • 0x30705:$g1: get_Clipboard
                • 0x30713:$g2: get_Keyboard
                • 0x30720:$g3: get_Password
                • 0x31ae8:$g4: get_CtrlKeyDown
                • 0x31af8:$g5: get_ShiftKeyDown
                • 0x31b09:$g6: get_AltKeyDown
                Click to see the 21 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeReversingLabs: Detection: 34%
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeVirustotal: Detection: 27%Perma Link
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeJoe Sandbox ML: detected
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail2.bpk-spb.ru", "Username": "grafkina.gg@sasta.ru", "Password": "SGZ3574344"}
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 78.140.195.54:587
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 78.140.195.54:587
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385128719.0000000001504000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573185738.000000000150C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385052025.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384518788.0000000006EA3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.1.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383888553.0000000006BFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fhESbX.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail2.bpk-spb.ru
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.580423251.0000000006E91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://microsoft.coC?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384993675.0000000006E0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385128719.0000000001504000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573185738.000000000150C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385128719.0000000001504000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573185738.000000000150C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384993675.0000000006E0D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384432501.0000000006BA5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579625475.0000000006BA5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579679447.0000000006BDF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579679447.0000000006BDF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385288042.0000000006B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384504580.0000000006BC5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000003.309946235.0000000000ECC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.coma-e
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573111699.00000000014FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385052025.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573111699.00000000014FC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385052025.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ffKDeOcgRB9.org
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: mail2.bpk-spb.ru

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.28b0724.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.2892f54.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4356, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4596, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b6C97159Du002d948Au002d4C34u002d8EDEu002dBB37431C88DCu007d/u0037D11B9D8u002d0763u002d4715u002d8625u002d2EAD2336D536.csLarge array initialization: .cctor: array initializer size 10930
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.28b0724.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.2892f54.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4356, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4596, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 0_2_00B9C1640_2_00B9C164
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 0_2_00B9E5B00_2_00B9E5B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061AC3581_2_061AC358
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061AD0A81_2_061AD0A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061A00401_2_061A0040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061A09101_2_061A0910
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061A29F81_2_061A29F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647A6131_2_0647A613
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_06477AB81_2_06477AB8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064700401_2_06470040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647F8681_2_0647F868
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064795681_2_06479568
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064751101_2_06475110
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064747581_2_06474758
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_06471F881_2_06471F88
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647F4701_2_0647F470
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064A2E081_2_064A2E08
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064AAF981_2_064AAF98
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064AD8981_2_064AD898
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064A89081_2_064A8908
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064A65981_2_064A6598
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_064A2DA41_2_064A2DA4
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename81a6843b-1903-472e-8fd2-c4bedf070891.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.347920571.0000000007120000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345204816.0000000004E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename81a6843b-1903-472e-8fd2-c4bedf070891.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000000.300564846.0000000000372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqzSt.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000000.334183368.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename81a6843b-1903-472e-8fd2-c4bedf070891.exe4 vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.571795820.00000000010F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeBinary or memory string: OriginalFilenameqzSt.exeB vs SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeReversingLabs: Detection: 34%
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeVirustotal: Detection: 27%
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.logJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2CA3.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@1/2
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000000.300564846.0000000000372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000000.300564846.0000000000372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000000.300564846.0000000000372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061AAEC0 push 8BD08B66h; retf 1_2_061AAEC5
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061AAC98 push 8B000005h; retf 1_2_061AAC9F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061A5C90 push eax; iretd 1_2_061A5C9D
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_061AB569 push es; ret 1_2_061AB5BC
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_06470040 push es; iretd 1_2_06470EB0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D646 push es; iretd 1_2_0647D64C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D64E push es; iretd 1_2_0647D650
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D656 push es; iretd 1_2_0647D658
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D652 push es; iretd 1_2_0647D654
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D65E push es; iretd 1_2_0647D660
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D65A push es; iretd 1_2_0647D65C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D662 push es; iretd 1_2_0647D684
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D60E push es; iretd 1_2_0647D610
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D612 push es; iretd 1_2_0647D614
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6D6 push es; iretd 1_2_0647D6D8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6D2 push es; iretd 1_2_0647D6D4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6DE push es; iretd 1_2_0647D6E0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6DA push es; iretd 1_2_0647D6DC
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6E6 push es; iretd 1_2_0647D6EC
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6E2 push es; iretd 1_2_0647D6E4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6EE push es; iretd 1_2_0647D6F0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6F6 push es; iretd 1_2_0647D6F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6F2 push es; iretd 1_2_0647D6F4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647DAF0 push es; retf 1_2_0647E8A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6FA push es; iretd 1_2_0647D71C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6A6 push es; iretd 1_2_0647D6A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6AE push es; iretd 1_2_0647D6D0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D6AA push es; iretd 1_2_0647D6AC
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D746 push es; iretd 1_2_0647D768
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D742 push es; iretd 1_2_0647D744
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_0647D76E push es; iretd 1_2_0647D770
                Source: initial sampleStatic PE information: section name: .text entropy: 7.671253644478303
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.28b0724.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.2892f54.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4356, type: MEMORYSTR
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 5928Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 4464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 4012Thread sleep count: 9518 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -99703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -99466s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -99320s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -99197s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -99038s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -98496s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -98372s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -98265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -98150s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -97957s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -97437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96916s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96789s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96605s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96482s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96246s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96135s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -96028s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95903s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95780s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 5880Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95555s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95427s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -95155s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94976s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94530s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94421s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -94000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93654s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93296s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93183s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -93062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -92952s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -92843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -92714s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe TID: 2912Thread sleep time: -92592s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWindow / User API: threadDelayed 9518Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 99703Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 99466Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 99320Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 99197Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 99038Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 98496Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 98372Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 98265Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 98150Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 97957Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 97437Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96916Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96789Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96605Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96482Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96359Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96246Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96135Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 96028Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95903Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95780Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95671Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95555Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95427Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95297Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 95155Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94976Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94750Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94530Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94421Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94250Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94140Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 94000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93843Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93654Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93515Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93406Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93296Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93183Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 93062Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 92952Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 92843Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 92714Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeThread delayed: delay time: 92592Jump to behavior
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579940741.0000000006C60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579940741.0000000006C60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-QoS Packet Scheduler-00009
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeCode function: 1_2_06475110 LdrInitializeThunk,1_2_06475110
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4596, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4596, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3bf5920.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3b5e900.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.3ad8b10.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe PID: 4596, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Credentials in Registry
                211
                Security Software Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS131
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials1
                Remote System Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                Software Packing
                DCSync114
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe34%ReversingLabsByteCode-MSIL.Infostealer.DarkStealer
                SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe28%VirustotalBrowse
                SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                1.0.SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                c-0001.c-msedge.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.acabogacia.org/doc00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.defence.gov.au/pki00%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.sk.ee/cps/00%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://www.ssc.lt/cps030%URL Reputationsafe
                http://ocsp.pki.gva.es00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.globaltrust.info0=0%Avira URL Cloudsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                http://microsoft.coC?0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://fhESbX.com0%Avira URL Cloudsafe
                http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                https://www.catcert.net/verarrel0%URL Reputationsafe
                http://www.disig.sk/ca0f0%URL Reputationsafe
                http://www.sk.ee/juur/crl/00%URL Reputationsafe
                http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://www.quovadis.bm00%URL Reputationsafe
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://www.trustdst.com/certificates/policy/ACES-index.html00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                http://www.accv.es000%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
                https://www.netlock.net/docs0%URL Reputationsafe
                http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
                http://ocsp.ncdc.gov.sa00%URL Reputationsafe
                http://mail2.bpk-spb.ru0%Avira URL Cloudsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;0%URL Reputationsafe
                https://repository.luxtrust.lu00%URL Reputationsafe
                http://www.tiro.coma-e0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                c-0001.c-msedge.net
                13.107.4.50
                truefalseunknown
                mail2.bpk-spb.ru
                78.140.195.54
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383888553.0000000006BFC000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.certplus.com/CRL/class3.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.e-me.lv/repository0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.acabogacia.org/doc0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.chambersign.org/chambersroot.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://ocsp.suscerte.gob.ve0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.postsignum.cz/crl/psrootqca2.crl02SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.dhimyotis.com/certignarootca.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.chambersign.org1SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.pkioverheid.nl/policies/root-policy0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://repository.swisssign.com/0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.suscerte.gob.ve/lcr0#SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.ssc.lt/root-c/cacrl.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://postsignum.ttc.cz/crl/psrootqca2.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ca.disig.sk/ca/crl/ca_disig.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.certplus.com/CRL/class3P.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.suscerte.gob.ve/dpc0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384119215.0000000006BE4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fhESbX.comSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.certplus.com/CRL/class2.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.disig.sk/ca/crl/ca_disig.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.defence.gov.au/pki0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sk.ee/cps/0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.globaltrust.info0=SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579679447.0000000006BDF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.anf.esSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://microsoft.coC?SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.580423251.0000000006E91000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://pki.registradores.org/normativa/index.htm0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://cps.root-x1.letsencrypt.org0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://policy.camerfirma.com0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.ssc.lt/cps03SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ocsp.pki.gva.es0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.anf.es/es/address-direccion.htmlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.anf.es/address/)1(0&SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.coma-eSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000003.309946235.0000000000ECC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ca.mtin.es/mtin/ocsp0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://cps.letsencrypt.org0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.385128719.0000000001504000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573185738.000000000150C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.572908994.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.ssc.lt/root-b/cacrl.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://web.ncdc.gov.sa/crl/nrcacomb1.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.certicamara.com/dpc/0ZSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.pki.wellsfargo.com/wsprca.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://wwww.certigna.fr/autorites/0mSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.dnie.es/dpc0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://mail2.bpk-spb.ruSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.576650294.00000000033DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ca.mtin.es/mtin/DPCyPoliticas0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.anf.es/AC/ANFServerCA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.globaltrust.info0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579679447.0000000006BDF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://certificates.starfieldtech.com/repository/1604SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://acedicom.edicomgroup.com/doc0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.certplus.com/CRL/class3TS.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              https://crl.anf.es/AC/ANFServerCA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384553962.0000000006E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.carterandcone.comlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://ac.economia.gob.mx/last.crl0GSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.catcert.net/verarrelSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.disig.sk/ca0fSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579642195.0000000006BBD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.e-szigno.hu/RootCA.crlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sk.ee/juur/crl/0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.chambersign.org/chambersignroot.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.xrampsecurity.com/XGCA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://certs.oati.net/repository/OATICA2.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.oces.trust2408.com/oces.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.quovadis.bm0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://eca.hinet.net/repository0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.ssc.lt/root-a/cacrl.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://certs.oaticerts.com/repository/OATICA2.crlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.trustdst.com/certificates/policy/ACES-index.html0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383812134.0000000006BDB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://certs.oati.net/repository/OATICA2.crt0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.accv.es00SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.pkioverheid.nl/policies/root-policy-G20SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.netlock.net/docsSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384504580.0000000006BC5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384190628.0000000006BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.e-trust.be/CPS/QNcertsSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://ocsp.ncdc.gov.sa0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://fedir.comsign.co.il/crl/ComSignCA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384847493.0000000006E12000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384610055.0000000006E04000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://web.ncdc.gov.sa/crl/nrcaparta1.crlSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384130770.0000000006BA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.datev.de/zertifikat-policy-int0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384432501.0000000006BA5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384041947.0000000006BC6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000002.579625475.0000000006BA5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384366166.0000000006B8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.384238128.0000000006B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000000.00000002.345955674.0000000006852000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://repository.luxtrust.lu0SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe, 00000001.00000003.383679132.0000000006E85000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  78.140.195.54
                                                                  mail2.bpk-spb.ruRussian Federation
                                                                  35000PROMETEYPROMETEYLLCRUfalse
                                                                  IP
                                                                  192.168.2.1
                                                                  Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                  Analysis ID:756011
                                                                  Start date and time:2022-11-29 13:52:42 +01:00
                                                                  Joe Sandbox Product:CloudBasic
                                                                  Overall analysis duration:0h 9m 5s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Sample file name:SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                  Number of analysed new started processes analysed:5
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • HDC enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/3@1/2
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HDC Information:Failed
                                                                  HCA Information:
                                                                  • Successful, ratio: 100%
                                                                  • Number of executed functions: 38
                                                                  • Number of non-executed functions: 2
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 13.107.4.50, 209.197.3.8
                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  TimeTypeDescription
                                                                  13:53:54API Interceptor652x Sleep call for process: SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe modified
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  c-0001.c-msedge.nethttp://xmas-art.ru/fo/ufmavtiwaehat-sejautfoja/haotwaep/376197/?T=44g47k0c-8q-1q1QZ44igflammatiojb&vfilclszdwwrqimq5-t-nsnba=contyasseursSZ6J2Get hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  Iwutiwno.dll.dllGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  kW1RcHd3Np.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  Urgent quote request -pdf-.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  094089010-094098574-1669343495-1669343493-2332.htmlGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  LhLntDLA0i.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  stGLUBW7kG.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  file.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  I8Kmld8K8U.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  CamScanner-397841.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  UPDATED SOA (2).exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  2022#U5e74#U4e2a#U4eba#U52b3#U52a8#U8865#U8d34.docx.docGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  REMITTANCE COPY.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  TNT Invoice_pdf.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  n2cFuTcuzL.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  file.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  SecuriteInfo.com.Trojan.PackedNET.1617.17943.11881.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  SecuriteInfo.com.W32.A-62389890.Eldorado.4706.2477.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  file.exeGet hashmaliciousBrowse
                                                                  • 13.107.4.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  PROMETEYPROMETEYLLCRUgHjDEkPBlv.elfGet hashmaliciousBrowse
                                                                  • 78.140.242.234
                                                                  igE3BClsMwGet hashmaliciousBrowse
                                                                  • 188.227.96.208
                                                                  EZ9f5eb6zRGet hashmaliciousBrowse
                                                                  • 78.140.193.155
                                                                  x86Get hashmaliciousBrowse
                                                                  • 78.140.199.254
                                                                  X45qi1q6uN.exeGet hashmaliciousBrowse
                                                                  • 78.111.84.6
                                                                  3FB154482EF8AE49941C9ED13063294CD4F97E28E5DD8.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  3D41425DAA1E1844BE0539723042DC532A640E5BA9EF9.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  1D18C3C86D70C5371E761BA77C60C9361183EDC26368E.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  4809227EE49AED05EEA812EC5FE60084177AE90A76E5A.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  05E2540B7113609289FFB8CCDCB605AA6DAC2873DCCE1.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  6104F2B4049168FEA236BB6A5B9A5194B878B61F87336.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  54BCD3308C140C8EC030F98697CC7F0E9D4585D54334A.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  07C18E8E0F92E75367DF02C4114947B038E86FCBC7C8E.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  ev8zhBsCzU.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  hrttshkxhj.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  O5t4RGAkKg.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  DG3kRWrQrf.exeGet hashmaliciousBrowse
                                                                  • 78.140.240.154
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):62919
                                                                  Entropy (8bit):7.995280921994772
                                                                  Encrypted:true
                                                                  SSDEEP:1536:d+OfVxHl7Wyf11lYom3xQcRVOtPHwQV4rP6Ji7:d+OxHxJlZcuPt4b6q
                                                                  MD5:3DCF580A93972319E82CAFBC047D34D5
                                                                  SHA1:8528D2A1363E5DE77DC3B1142850E51EAD0F4B6B
                                                                  SHA-256:40810E31F1B69075C727E6D557F9614D5880112895FF6F4DF1767E87AE5640D1
                                                                  SHA-512:98384BE7218340F95DAE88D1CB865F23A0B4E12855BEB6E74A3752274C9B4C601E493864DB777BCA677A370D0A9DBFFD68D94898A82014537F3A801CCE839C42
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:MSCF............,...................I.......Q.........GU.\ .authroot.stl..O..5..CK..<Tk...c_.d....A.K...+.d.-;%.BJII!.QIR..$t)Kd.-QQ*...g......^..~|N=...y....{. .4{...W....b.i...j.I.......1:..b\.0.....Ait.2t......w.%.&.",tL_...4.8L[G..;.57....AT.k.......V..K......(....mzS...G....r.".=H.?>.........x&...S%....X.M^..j...A..x.9`.9...A../.s..#.4#.....Id.w..B....s.8..(...dj....=L.)..s.d.]NxQX8....stV#.K.'7.tH..9u~.2..!..2./.....!..9C../...mP $..../y.....@p.6.}.`...5. 0r.w...@(.. .Q....)g.........m..z*.8rR..).].T9r<.L....0..`.........c.....;-.g..;.wk.)......i..c5.....{v.u...AS..=.....&.:.........+..P.N..9..EAQ.V.$s.......B.`.Mfe..8.......$...y-.q9J........W...2.Q8...O.......i..@\^.=X..dG$.M..#=....m.h..{9.'...-.v..Z...!....z.....N....i..^..,........d...%Xa~q.@D|0...Y.m...........&d.4..A..{t=...../.t.3._.....?-.....uroP?.d.Z..S..{...$.i....X..$.O..4..N.)....U.Z..P....X,.... ...Lg..35..W..s.!c...Ap.].P..8..M..W.......U..,...m.u..|=.m1..~..!..b...._.
                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):328
                                                                  Entropy (8bit):3.1085359935940406
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKLTEN1HlNiN+SkQlPlEGYRMY9z+4KlDA3RUeKlTAlWRyf1:DTk/kPlE99SNxAhUexYo1
                                                                  MD5:B81EE1A8A335587B8E02783E3D400D2D
                                                                  SHA1:68C4FAB0E6B9330789ADE1048D8BA46D5DE2C544
                                                                  SHA-256:ADCF90B3C43AF8DC7E11AFC46523C7D3EEF91AAB890B27D8C91505C1DBE62B3C
                                                                  SHA-512:EFA34C213A89887618E2998A1020AE87DECF11BC4F9AA7A8E3436DCED18E6313AD8D921465AF033CEFFB8383A2B11CFD453C588FAF7D4EB2DDEC460621D1B5EA
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:p...... ........"S.!B...(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.d.e.4.d.3.9.b.e.8.d.8.1.:.0."...
                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:true
                                                                  Reputation:high, very likely benign file
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.664770270231839
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  File name:SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  File size:960000
                                                                  MD5:277a9cd8ef361888eb41a6b7d0d94e26
                                                                  SHA1:9b703e613307793cd9f0309eb458d5f12f8400dd
                                                                  SHA256:8cdfbe67b609226da852adf3db3098941cffda7cea7443b935e1eed5fdae0bf3
                                                                  SHA512:fb35b96d3153b13ec2cea3c243114b9e1c8a58ee391c94f44555a2d7c07137702a4230446f616373c0cf139695d3dcf8fcc9a55de778ad2112f6874011dad44d
                                                                  SSDEEP:12288:o/x3qU+ai4t0ZiB3s8K4fMP7zs5y8m6Zwjz2boW9zq1krmvkhog/6Fb7wqzwBSDE:mxR0i3s8qDww8m6ZcQq21ht6woDdEPf
                                                                  TLSH:FC15DF8023A6AF75F1296BF37421900827B63C5EA5F1D2296DCDF0DE2A71B415AF0B17
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............0.................. ........@.. ....................................@................................
                                                                  Icon Hash:00828e8e8686b000
                                                                  Entrypoint:0x4ebd9a
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6385B5DD [Tue Nov 29 07:33:49 2022 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xebd480x4f.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x388.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xe9da00xe9e00False0.8298025370791021data7.671253644478303IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xec0000x3880x400False0.37109375data2.860979956316595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xee0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_VERSION0xec0580x32cdata
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 29, 2022 13:54:15.805341959 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:15.861587048 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:15.861691952 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:15.996521950 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:15.996942043 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.049736023 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.053610086 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.094831944 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.097780943 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.157645941 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.161354065 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.204152107 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.760996103 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.815157890 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.815237999 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.815262079 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.815372944 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.815437078 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.815469027 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.815517902 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.867993116 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:16.928946018 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.933392048 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:16.994105101 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:17.048006058 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.626239061 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.682285070 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.684568882 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.747383118 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.748119116 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.817748070 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.818945885 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.877036095 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.877501965 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.938349009 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.938827991 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.992013931 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:21.995357990 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.995471001 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.995975018 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:21.996053934 CET49702587192.168.2.578.140.195.54
                                                                  Nov 29, 2022 13:54:22.061959982 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:22.061983109 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:22.679898024 CET5874970278.140.195.54192.168.2.5
                                                                  Nov 29, 2022 13:54:22.720345974 CET49702587192.168.2.578.140.195.54
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 29, 2022 13:54:15.704055071 CET5144153192.168.2.58.8.8.8
                                                                  Nov 29, 2022 13:54:15.779623985 CET53514418.8.8.8192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Nov 29, 2022 13:54:15.704055071 CET192.168.2.58.8.8.80x57e7Standard query (0)mail2.bpk-spb.ruA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Nov 29, 2022 13:54:15.779623985 CET8.8.8.8192.168.2.50x57e7No error (0)mail2.bpk-spb.ru78.140.195.54A (IP address)IN (0x0001)false
                                                                  Nov 29, 2022 13:54:15.779623985 CET8.8.8.8192.168.2.50x57e7No error (0)mail2.bpk-spb.ru217.119.27.174A (IP address)IN (0x0001)false
                                                                  Nov 29, 2022 13:54:19.506061077 CET8.8.8.8192.168.2.50x7664No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                  Nov 29, 2022 13:54:19.506061077 CET8.8.8.8192.168.2.50x7664No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                                  Nov 29, 2022 13:54:34.261774063 CET8.8.8.8192.168.2.50x2e9bNo error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                  Nov 29, 2022 13:54:34.261774063 CET8.8.8.8192.168.2.50x2e9bNo error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  Nov 29, 2022 13:54:15.996521950 CET5874970278.140.195.54192.168.2.5220 mail2.bpk-spb.ru ESMTP Postfix
                                                                  Nov 29, 2022 13:54:15.996942043 CET49702587192.168.2.578.140.195.54EHLO 019635
                                                                  Nov 29, 2022 13:54:16.053610086 CET5874970278.140.195.54192.168.2.5250-mail2.bpk-spb.ru
                                                                  250-PIPELINING
                                                                  250-SIZE 36214400
                                                                  250-ETRN
                                                                  250-STARTTLS
                                                                  250-ENHANCEDSTATUSCODES
                                                                  250-8BITMIME
                                                                  250-DSN
                                                                  250-SMTPUTF8
                                                                  250 CHUNKING
                                                                  Nov 29, 2022 13:54:16.097780943 CET49702587192.168.2.578.140.195.54STARTTLS
                                                                  Nov 29, 2022 13:54:16.161354065 CET5874970278.140.195.54192.168.2.5220 2.0.0 Ready to start TLS

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:13:53:42
                                                                  Start date:29/11/2022
                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  Imagebase:0x370000
                                                                  File size:960000 bytes
                                                                  MD5 hash:277A9CD8EF361888EB41A6B7D0D94E26
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.342203286.0000000002B7B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.340639694.0000000002871000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.343455182.0000000003AD8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low

                                                                  Target ID:1
                                                                  Start time:13:53:56
                                                                  Start date:29/11/2022
                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.12191.6105.exe
                                                                  Imagebase:0xc70000
                                                                  File size:960000 bytes
                                                                  MD5 hash:277A9CD8EF361888EB41A6B7D0D94E26
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.332476278.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.573661423.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:12%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:90
                                                                    Total number of Limit Nodes:8
                                                                    execution_graph 9661 b9b95a DuplicateHandle 9662 b9b98e 9661->9662 9663 b998b0 9664 b998f8 GetModuleHandleW 9663->9664 9665 b998f2 9663->9665 9666 b99925 9664->9666 9665->9664 9667 b940d0 9668 b940e2 9667->9668 9669 b940ee 9668->9669 9673 b941e0 9668->9673 9677 b93c64 9669->9677 9671 b9410d 9674 b94205 9673->9674 9681 b942e0 9674->9681 9678 b93c6f 9677->9678 9689 b951a4 9678->9689 9680 b96a50 9680->9671 9683 b94307 9681->9683 9682 b943e4 9683->9682 9685 b93de4 9683->9685 9686 b95370 CreateActCtxA 9685->9686 9688 b95433 9686->9688 9690 b951af 9689->9690 9693 b957f8 9690->9693 9692 b96af5 9692->9680 9694 b95803 9693->9694 9697 b95828 9694->9697 9696 b96bda 9696->9692 9698 b95833 9697->9698 9701 b95858 9698->9701 9700 b96cca 9700->9696 9703 b95863 9701->9703 9702 b9741c 9702->9700 9703->9702 9705 b9b2ff 9703->9705 9706 b9b321 9705->9706 9707 b9b345 9706->9707 9710 b9b5b8 9706->9710 9714 b9b5b7 9706->9714 9707->9702 9711 b9b5c5 9710->9711 9712 b9b5ff 9711->9712 9718 b997b8 9711->9718 9712->9707 9715 b9b5c5 9714->9715 9716 b9b5ff 9715->9716 9717 b997b8 2 API calls 9715->9717 9716->9707 9717->9716 9719 b997c3 9718->9719 9721 b9c2f8 9719->9721 9722 b99880 9719->9722 9721->9721 9723 b9988b 9722->9723 9724 b95858 2 API calls 9723->9724 9725 b9c367 9723->9725 9724->9725 9729 b9e0e6 9725->9729 9737 b9e0e8 9725->9737 9726 b9c3a0 9726->9721 9731 b9e119 9729->9731 9733 b9e20a 9729->9733 9730 b9e125 9730->9726 9731->9730 9735 b9e568 LoadLibraryExW 9731->9735 9736 b9e567 LoadLibraryExW 9731->9736 9732 b9e165 9734 b9ef30 CreateWindowExW 9732->9734 9733->9726 9734->9733 9735->9732 9736->9732 9739 b9e119 9737->9739 9741 b9e20a 9737->9741 9738 b9e125 9738->9726 9739->9738 9743 b9e568 LoadLibraryExW 9739->9743 9744 b9e567 LoadLibraryExW 9739->9744 9740 b9e165 9742 b9ef30 CreateWindowExW 9740->9742 9741->9726 9742->9741 9743->9740 9744->9740 9745 b9b6d0 GetCurrentProcess 9746 b9b74a GetCurrentThread 9745->9746 9747 b9b743 9745->9747 9748 b9b780 9746->9748 9749 b9b787 GetCurrentProcess 9746->9749 9747->9746 9748->9749 9752 b9b7bd 9749->9752 9750 b9b7e5 GetCurrentThreadId 9751 b9b816 9750->9751 9752->9750 9753 b991d0 9757 b992c8 9753->9757 9761 b992c7 9753->9761 9754 b991df 9758 b992db 9757->9758 9759 b992eb 9758->9759 9765 b99958 9758->9765 9759->9754 9762 b992db 9761->9762 9763 b992eb 9762->9763 9764 b99958 LoadLibraryExW 9762->9764 9763->9754 9764->9763 9766 b9996c 9765->9766 9767 b99991 9766->9767 9769 b994b8 9766->9769 9767->9759 9770 b99b38 LoadLibraryExW 9769->9770 9772 b99bb1 9770->9772 9772->9767

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32 ref: 00B9B730
                                                                    • GetCurrentThread.KERNEL32 ref: 00B9B76D
                                                                    • GetCurrentProcess.KERNEL32 ref: 00B9B7AA
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00B9B803
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Current$ProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2063062207-0
                                                                    • Opcode ID: 933d831212c256019b0d0509b08ddf979a1e4a972410fd3bdf4a2ce694a0df3e
                                                                    • Instruction ID: b3bff54dc2992e46ce68077a6057c22dcee63b72c18062f739069684cb340d28
                                                                    • Opcode Fuzzy Hash: 933d831212c256019b0d0509b08ddf979a1e4a972410fd3bdf4a2ce694a0df3e
                                                                    • Instruction Fuzzy Hash: 675127B4D002498FDB14CFAAD688BDEBBF1EB89314F108569E409B7350D7746944CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 19 b93de4-b95431 CreateActCtxA 22 b9543a-b95494 19->22 23 b95433-b95439 19->23 30 b954a3-b954a7 22->30 31 b95496-b95499 22->31 23->22 32 b954a9-b954b5 30->32 33 b954b8 30->33 31->30 32->33 35 b954b9 33->35 35->35
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 00B95421
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID: 0`$ta
                                                                    • API String ID: 2289755597-1580671299
                                                                    • Opcode ID: c2287c95f986c27bf04f2d24087b7fd7e2d617b63e47868029d59b495b657619
                                                                    • Instruction ID: 2351353f412216c8a177fb2fbb6a51e8bb6a85978cc635ce72d250af1f69a311
                                                                    • Opcode Fuzzy Hash: c2287c95f986c27bf04f2d24087b7fd7e2d617b63e47868029d59b495b657619
                                                                    • Instruction Fuzzy Hash: 9C410070C00618CBDB20CFA9C884BCEBBF1BF59309F20806AD408AB351D7756989CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 36 b994b8-b99b78 38 b99b7a-b99b7d 36->38 39 b99b80-b99baf LoadLibraryExW 36->39 38->39 40 b99bb8-b99bd5 39->40 41 b99bb1-b99bb7 39->41 41->40
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B99991,00000800,00000000,00000000), ref: 00B99BA2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID: XS
                                                                    • API String ID: 1029625771-1674197376
                                                                    • Opcode ID: 39b7f874788e8f63993b5ac13de9365de2144bf75680a6619b6fede78c371f4d
                                                                    • Instruction ID: 3b7b98064714bbc1628916ce6a95daf38edb246f75d549a3609d63c23c36ff0c
                                                                    • Opcode Fuzzy Hash: 39b7f874788e8f63993b5ac13de9365de2144bf75680a6619b6fede78c371f4d
                                                                    • Instruction Fuzzy Hash: F511E7B69002499FDF10CF9AD544BDEFBF4EB98324F14846ED415A7600C379A945CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 44 b9fced-b9fcef 45 b9fcf1-b9fd18 call b9de0c 44->45 46 b9fd25-b9fd36 44->46 50 b9fd1d-b9fd1e 45->50 48 b9fd38-b9fd39 46->48 49 b9fd3a-b9fd9e 46->49 48->49 51 b9fda9-b9fdb0 49->51 52 b9fda0-b9fda6 49->52 53 b9fdbb-b9fe5a CreateWindowExW 51->53 54 b9fdb2-b9fdb8 51->54 52->51 56 b9fe5c-b9fe62 53->56 57 b9fe63-b9fe9b 53->57 54->53 56->57 61 b9fea8 57->61 62 b9fe9d-b9fea0 57->62 63 b9fea9 61->63 62->61 63->63
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B9FE4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: f4d6209dd3f76a500e9a1a1890c2f7d04ce88a4f96d14f87b2726afd1ddb1119
                                                                    • Instruction ID: f6d4f600eb94b7d530cf31ef4cdf0fe9653f8e5605209a18914f1039cc79621c
                                                                    • Opcode Fuzzy Hash: f4d6209dd3f76a500e9a1a1890c2f7d04ce88a4f96d14f87b2726afd1ddb1119
                                                                    • Instruction Fuzzy Hash: FD51EDB1D00249AFDF11CFA9C884ADEBFB5FF48314F14816AE818AB221D7759855CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 64 b9fd38-b9fd9e 66 b9fda9-b9fdb0 64->66 67 b9fda0-b9fda6 64->67 68 b9fdbb-b9fdf3 66->68 69 b9fdb2-b9fdb8 66->69 67->66 70 b9fdfb-b9fe5a CreateWindowExW 68->70 69->68 71 b9fe5c-b9fe62 70->71 72 b9fe63-b9fe9b 70->72 71->72 76 b9fea8 72->76 77 b9fe9d-b9fea0 72->77 78 b9fea9 76->78 77->76 78->78
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B9FE4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 716092398-0
                                                                    • Opcode ID: 064af0d28c51a5256fda5ada342cc5088b4eb23c18c665675415c6cb7e891c57
                                                                    • Instruction ID: 1e0ce0784b5a9fce59b40f293095193a4ecd6c54e18a2bffee6c3f3f7d324d31
                                                                    • Opcode Fuzzy Hash: 064af0d28c51a5256fda5ada342cc5088b4eb23c18c665675415c6cb7e891c57
                                                                    • Instruction Fuzzy Hash: 1E41CEB1D103099FDF14CFAAC984ADEBBB5FF48314F24852AE819AB210D7749885CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 79 b998b0-b998f0 80 b998f8-b99923 GetModuleHandleW 79->80 81 b998f2-b998f5 79->81 82 b9992c-b99940 80->82 83 b99925-b9992b 80->83 81->80 83->82
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00B99916
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 3b9f0c720dcf299bad14d14688ffa829acd1f258b7355373b8f2c897071313c0
                                                                    • Instruction ID: 9b310b9b5cbadbd5bf74511f8c7db378247f9198dd450dd94ababd4892a9c9b3
                                                                    • Opcode Fuzzy Hash: 3b9f0c720dcf299bad14d14688ffa829acd1f258b7355373b8f2c897071313c0
                                                                    • Instruction Fuzzy Hash: A51102B6D002498FDB20CF9AC444BDEFBF4EB48324F10846ED419A7600C375A945CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 85 b9b95a-b9b98c DuplicateHandle 86 b9b98e-b9b994 85->86 87 b9b995-b9b9b2 85->87 86->87
                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B9B97F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: 191824c33a5b638a97ddea486d3259351f79ec9f54e7b709338da061777cb6e4
                                                                    • Instruction ID: 0fe80adba2edd439fc3c07e4401f240973bc61ecf4b7b57e3c3bc6329b3f6c18
                                                                    • Opcode Fuzzy Hash: 191824c33a5b638a97ddea486d3259351f79ec9f54e7b709338da061777cb6e4
                                                                    • Instruction Fuzzy Hash: B9F06DB2C00208EEDF108FD9E844BDEFBF5EB88314F14841AE114A7210C3759854CB60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 338369e9db6d23976c53024a8216c2e357afb25c187bf88dbf9b0650e60fcf6a
                                                                    • Instruction ID: f42419e1f78c9fea34ffd88739e1f769cae4cf1a104d75e78c1395fc801576f2
                                                                    • Opcode Fuzzy Hash: 338369e9db6d23976c53024a8216c2e357afb25c187bf88dbf9b0650e60fcf6a
                                                                    • Instruction Fuzzy Hash: D51291B1411F468BE371DF65ED983897BA1B745328B904318D2A13BAF1DBF8118ACF46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.340001313.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_b90000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1f8bba49a9bc72c79967f828c6754bbae2f8e1dedd0e8bf4449d6ae7cffbe04d
                                                                    • Instruction ID: 25fe62f4be60401f910b7a762120d6be2683c66be1ec0d2733a383eeb7349c0c
                                                                    • Opcode Fuzzy Hash: 1f8bba49a9bc72c79967f828c6754bbae2f8e1dedd0e8bf4449d6ae7cffbe04d
                                                                    • Instruction Fuzzy Hash: 47A13D32E002198FCF15DFB5C98499EBBF2FF85300B1585BAE905BB261EB71A955CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:24%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:239
                                                                    Total number of Limit Nodes:16
                                                                    execution_graph 35702 61a6468 35704 61a6481 35702->35704 35703 61a68db 35704->35703 35707 61a7270 35704->35707 35731 61a7280 35704->35731 35709 61a7280 35707->35709 35708 61a733c 35708->35704 35709->35708 35755 61a7f8e 35709->35755 35762 61a7c88 KiUserExceptionDispatcher 35709->35762 35772 61a8018 35709->35772 35779 61a80e7 35709->35779 35783 61a7cee 35709->35783 35793 61a7d78 35709->35793 35803 61a7343 35709->35803 35808 61a7f49 35709->35808 35815 61a7ec8 35709->35815 35822 61a7350 35709->35822 35827 61a7fd3 35709->35827 35834 61a805d 35709->35834 35841 61a8123 35709->35841 35845 61a80a2 35709->35845 35849 61a7ca9 35709->35849 35859 61a7d33 35709->35859 35869 61a7dbd 35709->35869 35879 61a7e3e 35709->35879 35886 61a7f04 35709->35886 35893 61a7e83 35709->35893 35900 61a7e02 35709->35900 35733 61a7288 35731->35733 35732 61a733c 35732->35704 35733->35732 35734 61a8018 3 API calls 35733->35734 35735 61a7c88 9 API calls 35733->35735 35736 61a7f8e 3 API calls 35733->35736 35737 61a7e02 8 API calls 35733->35737 35738 61a7e83 3 API calls 35733->35738 35739 61a7f04 3 API calls 35733->35739 35740 61a7e3e 3 API calls 35733->35740 35741 61a7dbd 8 API calls 35733->35741 35742 61a7d33 8 API calls 35733->35742 35743 61a7ca9 8 API calls 35733->35743 35744 61a80a2 KiUserExceptionDispatcher 35733->35744 35745 61a8123 KiUserExceptionDispatcher 35733->35745 35746 61a805d 3 API calls 35733->35746 35747 61a7fd3 3 API calls 35733->35747 35748 61a7350 5 API calls 35733->35748 35749 61a7ec8 3 API calls 35733->35749 35750 61a7f49 3 API calls 35733->35750 35751 61a7343 5 API calls 35733->35751 35752 61a7d78 8 API calls 35733->35752 35753 61a7cee 8 API calls 35733->35753 35754 61a80e7 KiUserExceptionDispatcher 35733->35754 35734->35733 35735->35733 35736->35733 35737->35733 35738->35733 35739->35733 35740->35733 35741->35733 35742->35733 35743->35733 35744->35733 35745->35733 35746->35733 35747->35733 35748->35733 35749->35733 35750->35733 35751->35733 35752->35733 35753->35733 35754->35733 35756 61a7f9f 35755->35756 35910 64ac4c8 35756->35910 35915 64ac4d8 35756->35915 35757 61a8087 KiUserExceptionDispatcher 35759 61a8163 35757->35759 35759->35709 35763 61a7ca7 35762->35763 35924 6479120 35763->35924 35930 6478b70 35763->35930 35764 61a7e23 35768 64ac4c8 2 API calls 35764->35768 35769 64ac4d8 2 API calls 35764->35769 35765 61a8087 KiUserExceptionDispatcher 35767 61a8163 35765->35767 35767->35709 35768->35765 35769->35765 35773 61a8029 35772->35773 35777 64ac4c8 2 API calls 35773->35777 35778 64ac4d8 2 API calls 35773->35778 35774 61a8087 KiUserExceptionDispatcher 35776 61a8163 35774->35776 35776->35709 35777->35774 35778->35774 35780 61a80f8 KiUserExceptionDispatcher 35779->35780 35782 61a8163 35780->35782 35782->35709 35784 61a7cff 35783->35784 35791 6479120 5 API calls 35784->35791 35792 6478b70 5 API calls 35784->35792 35785 61a7e23 35789 64ac4c8 2 API calls 35785->35789 35790 64ac4d8 2 API calls 35785->35790 35786 61a8087 KiUserExceptionDispatcher 35788 61a8163 35786->35788 35788->35709 35789->35786 35790->35786 35791->35785 35792->35785 35794 61a7d89 35793->35794 35799 6479120 5 API calls 35794->35799 35800 6478b70 5 API calls 35794->35800 35795 61a7e23 35801 64ac4c8 2 API calls 35795->35801 35802 64ac4d8 2 API calls 35795->35802 35796 61a8087 KiUserExceptionDispatcher 35798 61a8163 35796->35798 35798->35709 35799->35795 35800->35795 35801->35796 35802->35796 35805 61a734d 35803->35805 35804 61a7c50 35805->35804 35982 6475048 35805->35982 35988 6475038 35805->35988 35809 61a7f5a 35808->35809 35813 64ac4c8 2 API calls 35809->35813 35814 64ac4d8 2 API calls 35809->35814 35810 61a8087 KiUserExceptionDispatcher 35812 61a8163 35810->35812 35812->35709 35813->35810 35814->35810 35816 61a7ed9 35815->35816 35820 64ac4c8 2 API calls 35816->35820 35821 64ac4d8 2 API calls 35816->35821 35817 61a8087 KiUserExceptionDispatcher 35819 61a8163 35817->35819 35819->35709 35820->35817 35821->35817 35823 61a7375 35822->35823 35824 61a7c50 35823->35824 35825 6475048 5 API calls 35823->35825 35826 6475038 5 API calls 35823->35826 35825->35823 35826->35823 35828 61a7fe4 35827->35828 35832 64ac4c8 2 API calls 35828->35832 35833 64ac4d8 2 API calls 35828->35833 35829 61a8087 KiUserExceptionDispatcher 35831 61a8163 35829->35831 35831->35709 35832->35829 35833->35829 35835 61a806e 35834->35835 35839 64ac4c8 2 API calls 35835->35839 35840 64ac4d8 2 API calls 35835->35840 35836 61a8087 KiUserExceptionDispatcher 35838 61a8163 35836->35838 35838->35709 35839->35836 35840->35836 35842 61a8134 KiUserExceptionDispatcher 35841->35842 35844 61a8163 35842->35844 35844->35709 35846 61a80b3 KiUserExceptionDispatcher 35845->35846 35848 61a8163 35846->35848 35848->35709 35850 61a7cba 35849->35850 35855 6479120 5 API calls 35850->35855 35856 6478b70 5 API calls 35850->35856 35851 61a7e23 35857 64ac4c8 2 API calls 35851->35857 35858 64ac4d8 2 API calls 35851->35858 35852 61a8087 KiUserExceptionDispatcher 35854 61a8163 35852->35854 35854->35709 35855->35851 35856->35851 35857->35852 35858->35852 35860 61a7d44 35859->35860 35867 6479120 5 API calls 35860->35867 35868 6478b70 5 API calls 35860->35868 35861 61a7e23 35865 64ac4c8 2 API calls 35861->35865 35866 64ac4d8 2 API calls 35861->35866 35862 61a8087 KiUserExceptionDispatcher 35864 61a8163 35862->35864 35864->35709 35865->35862 35866->35862 35867->35861 35868->35861 35870 61a7dce 35869->35870 35877 6479120 5 API calls 35870->35877 35878 6478b70 5 API calls 35870->35878 35871 61a7e23 35875 64ac4c8 2 API calls 35871->35875 35876 64ac4d8 2 API calls 35871->35876 35872 61a8087 KiUserExceptionDispatcher 35874 61a8163 35872->35874 35874->35709 35875->35872 35876->35872 35877->35871 35878->35871 35880 61a7e4f 35879->35880 35884 64ac4c8 2 API calls 35880->35884 35885 64ac4d8 2 API calls 35880->35885 35881 61a8087 KiUserExceptionDispatcher 35883 61a8163 35881->35883 35883->35709 35884->35881 35885->35881 35887 61a7f15 35886->35887 35891 64ac4c8 2 API calls 35887->35891 35892 64ac4d8 2 API calls 35887->35892 35888 61a8087 KiUserExceptionDispatcher 35890 61a8163 35888->35890 35890->35709 35891->35888 35892->35888 35894 61a7e94 35893->35894 35898 64ac4c8 2 API calls 35894->35898 35899 64ac4d8 2 API calls 35894->35899 35895 61a8087 KiUserExceptionDispatcher 35897 61a8163 35895->35897 35897->35709 35898->35895 35899->35895 35901 61a7e13 35900->35901 35908 6479120 5 API calls 35901->35908 35909 6478b70 5 API calls 35901->35909 35902 61a7e23 35906 64ac4c8 2 API calls 35902->35906 35907 64ac4d8 2 API calls 35902->35907 35903 61a8087 KiUserExceptionDispatcher 35905 61a8163 35903->35905 35905->35709 35906->35903 35907->35903 35908->35902 35909->35902 35914 64ac4d8 35910->35914 35911 64ac760 35911->35757 35913 64ac0f8 RegQueryValueExW 35913->35914 35914->35911 35914->35913 35920 64ac0ec 35914->35920 35916 64ac4f7 35915->35916 35917 64ac760 35916->35917 35918 64ac0ec RegOpenKeyExW 35916->35918 35919 64ac0f8 RegQueryValueExW 35916->35919 35917->35757 35918->35916 35919->35916 35921 64ac7e8 RegOpenKeyExW 35920->35921 35923 64ac8ae 35921->35923 35923->35923 35925 6479140 35924->35925 35937 64750c0 35925->35937 35927 6479160 35949 6475110 35927->35949 35932 6478b80 35930->35932 35931 6478b91 35931->35764 35932->35931 35933 64750c0 5 API calls 35932->35933 35934 6479160 35933->35934 35935 6475110 5 API calls 35934->35935 35936 647916a 35935->35936 35936->35764 35938 64750f4 35937->35938 35939 64750d1 35937->35939 35945 64750c0 4 API calls 35938->35945 35947 6475110 4 API calls 35938->35947 35959 64753c6 35938->35959 35964 64751ae 35938->35964 35969 64750b0 35938->35969 35939->35927 35940 64753fe 35940->35927 35941 64756b7 LdrInitializeThunk 35943 64756d3 35941->35943 35942 6475130 35942->35940 35942->35941 35945->35942 35947->35942 35954 64753c6 LdrInitializeThunk 35949->35954 35955 64750c0 4 API calls 35949->35955 35956 64750b0 4 API calls 35949->35956 35957 6475110 4 API calls 35949->35957 35958 64751ae LdrInitializeThunk 35949->35958 35950 64753fe 35950->35764 35951 64756b7 LdrInitializeThunk 35953 64756d3 35951->35953 35952 6475130 35952->35950 35952->35951 35954->35952 35955->35952 35956->35952 35957->35952 35958->35952 35962 6475169 35959->35962 35960 64753fe 35960->35942 35961 64756b7 LdrInitializeThunk 35963 64756d3 35961->35963 35962->35960 35962->35961 35967 6475169 35964->35967 35965 64753fe 35965->35942 35966 64756b7 LdrInitializeThunk 35968 64756d3 35966->35968 35967->35965 35967->35966 35970 64750a8 35969->35970 35972 64750ba 35969->35972 35970->35942 35971 64750d1 35971->35942 35972->35971 35977 64753c6 LdrInitializeThunk 35972->35977 35978 64750c0 4 API calls 35972->35978 35979 64750b0 4 API calls 35972->35979 35980 6475110 4 API calls 35972->35980 35981 64751ae LdrInitializeThunk 35972->35981 35973 64753fe 35973->35942 35974 64756b7 LdrInitializeThunk 35976 64756d3 35974->35976 35975 6475130 35975->35973 35975->35974 35977->35975 35978->35975 35979->35975 35980->35975 35981->35975 35983 6475068 35982->35983 35985 64750c0 5 API calls 35983->35985 35986 64750b0 5 API calls 35983->35986 35987 6475110 5 API calls 35983->35987 35984 6475073 35984->35805 35985->35984 35986->35984 35987->35984 35989 6475048 35988->35989 35991 64750c0 5 API calls 35989->35991 35992 64750b0 5 API calls 35989->35992 35993 6475110 5 API calls 35989->35993 35990 6475073 35990->35805 35991->35990 35992->35990 35993->35990 35994 64ad3d0 35995 64ad3ef LdrInitializeThunk 35994->35995 35997 64ad442 35995->35997

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1988 6475110-6475127 2201 647512a call 64753c6 1988->2201 2202 647512a call 64750c0 1988->2202 2203 647512a call 64750b0 1988->2203 2204 647512a call 6475110 1988->2204 2205 647512a call 64751ae 1988->2205 1989 6475130-6475163 1993 64753fe-6475408 1989->1993 1994 6475169-6475172 1989->1994 1995 6475410-647543f 1994->1995 1996 6475178-647518b 1994->1996 2001 6475441-6475444 1995->2001 1999 6475192-64751a0 1996->1999 2000 647518d 1996->2000 2206 64751a3 call 64791a9 1999->2206 2207 64751a3 call 64792a8 1999->2207 2002 64753e9-64753ed 2000->2002 2003 6475467-647546a 2001->2003 2004 6475446-647544e 2001->2004 2005 64753ef-64753f8 2002->2005 2006 647540b 2002->2006 2008 647548c-647548f 2003->2008 2009 647546c-6475487 2003->2009 2020 6475456-6475462 2004->2020 2005->1993 2005->1994 2006->1995 2010 64754d2-64754d5 2008->2010 2011 6475491-6475494 2008->2011 2009->2008 2014 64754d7 2010->2014 2015 64754bb-64754be 2010->2015 2016 64754b6-64754b9 2011->2016 2017 6475496-64754b1 2011->2017 2019 64754dc-64754df 2014->2019 2023 64754c4-64754c8 2015->2023 2024 64755c3-64755ef 2015->2024 2016->2015 2021 64754cd-64754d0 2016->2021 2017->2016 2018 64751a9-64751c6 2199 64751c9 call 647f470 2018->2199 2200 64751c9 call 647f868 2018->2200 2026 64754f7-64754fa 2019->2026 2027 64754e1-64754f0 2019->2027 2020->2003 2021->2010 2021->2019 2023->2021 2035 6475614-647563f 2024->2035 2036 64755f1-64755fb 2024->2036 2030 6475501-6475504 2026->2030 2031 64754fc-64754fe 2026->2031 2041 6475524-6475540 2027->2041 2042 64754f2 2027->2042 2039 6475506 2030->2039 2040 647550b-647550e 2030->2040 2031->2030 2033 64751cf-64751d1 2033->2002 2034 64751d7-64751e2 2033->2034 2034->2006 2052 64751e8-64751f2 2034->2052 2055 6475664-647567c 2035->2055 2056 6475641-647564b 2035->2056 2043 6475610-6475613 2036->2043 2044 64755fd-647560e 2036->2044 2039->2040 2045 6475510 2040->2045 2046 647551f-6475522 2040->2046 2042->2026 2044->2043 2058 6475518-647551a 2045->2058 2046->2041 2047 6475541-6475544 2046->2047 2053 6475567-647556a 2047->2053 2054 6475546-6475560 2047->2054 2052->2002 2059 64751f8-647525e 2052->2059 2062 647558d-6475590 2053->2062 2063 647556c-6475588 2053->2063 2072 6475597-647559a 2054->2072 2084 6475562 2054->2084 2069 6475695-64756cc LdrInitializeThunk 2055->2069 2070 647567e-6475693 2055->2070 2060 6475660-6475663 2056->2060 2061 647564d-647565e 2056->2061 2058->2046 2114 6475264-64752b5 2059->2114 2115 647532e-6475349 2059->2115 2061->2060 2065 64755b3-64755bd 2062->2065 2066 6475592-6475595 2062->2066 2063->2062 2066->2072 2073 64755a1-64755a3 2066->2073 2090 64756d3-64756df 2069->2090 2070->2069 2076 64755be 2072->2076 2077 647559c 2072->2077 2078 64755a5 2073->2078 2079 64755aa-64755ad 2073->2079 2076->2024 2077->2073 2078->2079 2079->2001 2079->2065 2084->2053 2092 64756e5-64756ee 2090->2092 2093 64758e2-64758f5 2090->2093 2096 6475917 2092->2096 2097 64756f4-6475709 2092->2097 2094 647591c-6475920 2093->2094 2098 6475922 2094->2098 2099 647592b 2094->2099 2096->2094 2103 6475723-647573e 2097->2103 2104 647570b-647571e 2097->2104 2098->2099 2102 647592c 2099->2102 2102->2102 2116 6475740-647574a 2103->2116 2117 647574c 2103->2117 2106 64758b6-64758ba 2104->2106 2108 64758c5 2106->2108 2109 64758bc 2106->2109 2108->2093 2109->2108 2146 64752b7-64752d3 2114->2146 2147 64752d5-64752f8 2114->2147 2128 647534b-647534f 2115->2128 2119 6475751-6475753 2116->2119 2117->2119 2121 6475755-6475768 2119->2121 2122 647576d-6475808 2119->2122 2121->2106 2180 6475816 2122->2180 2181 647580a-6475814 2122->2181 2131 6475351-647535e 2128->2131 2132 6475360 2128->2132 2134 6475365-6475367 2131->2134 2132->2134 2136 64753d7-64753db 2134->2136 2137 6475369-647536b 2134->2137 2136->2006 2139 64753dd-64753e3 2136->2139 2140 647536d-6475377 2137->2140 2141 6475379 2137->2141 2139->2002 2139->2059 2143 647537e-6475380 2140->2143 2141->2143 2143->2136 2144 6475382-6475384 2143->2144 2144->2136 2148 6475386-64753c4 2144->2148 2161 64752fa-647532c 2146->2161 2147->2161 2148->2136 2161->2128 2182 647581b-647581d 2180->2182 2181->2182 2183 6475860-64758b4 2182->2183 2184 647581f-6475821 2182->2184 2183->2106 2185 6475823-647582d 2184->2185 2186 647582f 2184->2186 2187 6475834-6475836 2185->2187 2186->2187 2187->2183 2189 6475838-647585e 2187->2189 2189->2183 2199->2033 2200->2033 2201->1989 2202->1989 2203->1989 2204->1989 2205->1989 2206->2018 2207->2018
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579038195.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_6470000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: 9b2a554146fd7f5665a4795896d86e4a19dc1bba7e6e78fc45e749ee179f8215
                                                                    • Instruction ID: 0666fc6ce31a462e294acc240db475f62e604c2e9dfc545d82d330c6c3e584b6
                                                                    • Opcode Fuzzy Hash: 9b2a554146fd7f5665a4795896d86e4a19dc1bba7e6e78fc45e749ee179f8215
                                                                    • Instruction Fuzzy Hash: 70328C70A102058FDB69DBB4D5486AEBBF2EF89315F14842AE406DB394DF38DC45CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 61a7c88-61a7d12 KiUserExceptionDispatcher 178 61a7d12 call 6476831 0->178 179 61a7d12 call 64767d0 0->179 6 61a7d18-61a7d57 182 61a7d57 call 64779f7 6->182 183 61a7d57 call 64773d0 6->183 184 61a7d57 call 647747e 6->184 185 61a7d57 call 6477998 6->185 9 61a7d5d-61a7de1 186 61a7de1 call 6477c02 9->186 187 61a7de1 call 6477dcd 9->187 188 61a7de1 call 6477a58 9->188 189 61a7de1 call 6477ab8 9->189 15 61a7de7-61a7e1d 190 61a7e1d call 6479120 15->190 191 61a7e1d call 6478b70 15->191 18 61a7e23-61a7e62 194 61a7e62 call 64a29af 18->194 195 61a7e62 call 64a2950 18->195 196 61a7e62 call 64a2941 18->196 21 61a7e68-61a7ea7 150 61a7ea7 call 64a2d08 21->150 151 61a7ea7 call 64a2d5c 21->151 152 61a7ea7 call 64a2a70 21->152 153 61a7ea7 call 64a2a10 21->153 24 61a7ead-61a7ee3 157 61a7ee3 call 64a92c0 24->157 158 61a7ee3 call 64a92d0 24->158 27 61a7ee9-61a7f6d 165 61a7f6d call 64aa3d8 27->165 166 61a7f6d call 64aa20e 27->166 167 61a7f6d call 64aa323 27->167 168 61a7f6d call 64aa000 27->168 33 61a7f73-61a7fb2 169 61a7fb2 call 64aa8df 33->169 170 61a7fb2 call 64aa99f 33->170 171 61a7fb2 call 64aa940 33->171 36 61a7fb8-61a7ff7 174 61a7ff7 call 64aaa60 36->174 175 61a7ff7 call 64aaa01 36->175 39 61a7ffd-61a803c 176 61a803c call 64aaf98 39->176 177 61a803c call 64aaf97 39->177 42 61a8042-61a8081 180 61a8081 call 64ac4c8 42->180 181 61a8081 call 64ac4d8 42->181 45 61a8087-61a81a2 KiUserExceptionDispatcher 192 61a81a2 call 64ad7e8 45->192 193 61a81a2 call 64ad898 45->193 57 61a81a8-61a8223 154 61a8223 call 64af2cf 57->154 155 61a8223 call 64af37f 57->155 156 61a8223 call 64af320 57->156 63 61a8229-61a8268 159 61a8268 call 64af49f 63->159 160 61a8268 call 64af440 63->160 161 61a8268 call 64af3e0 63->161 66 61a826e-61a82ad 162 61a82ad call 64af5bf 66->162 163 61a82ad call 64af560 66->163 164 61a82ad call 64af500 66->164 69 61a82b3-61a832e 172 61a832e call 64af8a0 69->172 173 61a832e call 64af9a0 69->173 75 61a8334-61a89b8 147 61a89be-61a8a0d 75->147 150->24 151->24 152->24 153->24 154->63 155->63 156->63 157->27 158->27 159->66 160->66 161->66 162->69 163->69 164->69 165->33 166->33 167->33 168->33 169->36 170->36 171->36 172->75 173->75 174->39 175->39 176->42 177->42 178->6 179->6 180->45 181->45 182->9 183->9 184->9 185->9 186->15 187->15 188->15 189->15 190->18 191->18 192->57 193->57 194->21 195->21 196->21
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A7C88
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 9ccce544eed44397865717457b45da1c39511bb91c1a0a830f44120274014304
                                                                    • Instruction ID: 2ff3c57f65c444029cd1028ab432c960756777eceef173f7729f2b959e0da9b2
                                                                    • Opcode Fuzzy Hash: 9ccce544eed44397865717457b45da1c39511bb91c1a0a830f44120274014304
                                                                    • Instruction Fuzzy Hash: 0B12A438902269CFDBA8DF34D98969CB7B2FF49346F1045E9D50A92340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2803 61a7ca9-61a7d12 2959 61a7d12 call 6476831 2803->2959 2960 61a7d12 call 64767d0 2803->2960 2810 61a7d18-61a7d57 2961 61a7d57 call 64779f7 2810->2961 2962 61a7d57 call 64773d0 2810->2962 2963 61a7d57 call 647747e 2810->2963 2964 61a7d57 call 6477998 2810->2964 2813 61a7d5d-61a7de1 2965 61a7de1 call 6477c02 2813->2965 2966 61a7de1 call 6477dcd 2813->2966 2967 61a7de1 call 6477a58 2813->2967 2968 61a7de1 call 6477ab8 2813->2968 2819 61a7de7-61a7e1d 2969 61a7e1d call 6479120 2819->2969 2970 61a7e1d call 6478b70 2819->2970 2822 61a7e23-61a7e62 2971 61a7e62 call 64a29af 2822->2971 2972 61a7e62 call 64a2950 2822->2972 2973 61a7e62 call 64a2941 2822->2973 2825 61a7e68-61a7ea7 2974 61a7ea7 call 64a2d08 2825->2974 2975 61a7ea7 call 64a2d5c 2825->2975 2976 61a7ea7 call 64a2a70 2825->2976 2977 61a7ea7 call 64a2a10 2825->2977 2828 61a7ead-61a7ee3 2978 61a7ee3 call 64a92c0 2828->2978 2979 61a7ee3 call 64a92d0 2828->2979 2831 61a7ee9-61a7f6d 2980 61a7f6d call 64aa3d8 2831->2980 2981 61a7f6d call 64aa20e 2831->2981 2982 61a7f6d call 64aa323 2831->2982 2983 61a7f6d call 64aa000 2831->2983 2837 61a7f73-61a7fb2 2984 61a7fb2 call 64aa8df 2837->2984 2985 61a7fb2 call 64aa99f 2837->2985 2986 61a7fb2 call 64aa940 2837->2986 2840 61a7fb8-61a7ff7 2987 61a7ff7 call 64aaa60 2840->2987 2988 61a7ff7 call 64aaa01 2840->2988 2843 61a7ffd-61a803c 2989 61a803c call 64aaf98 2843->2989 2990 61a803c call 64aaf97 2843->2990 2846 61a8042-61a8081 2991 61a8081 call 64ac4c8 2846->2991 2992 61a8081 call 64ac4d8 2846->2992 2849 61a8087-61a81a2 KiUserExceptionDispatcher 2993 61a81a2 call 64ad7e8 2849->2993 2994 61a81a2 call 64ad898 2849->2994 2861 61a81a8-61a8223 2995 61a8223 call 64af2cf 2861->2995 2996 61a8223 call 64af37f 2861->2996 2997 61a8223 call 64af320 2861->2997 2867 61a8229-61a8268 2998 61a8268 call 64af49f 2867->2998 2999 61a8268 call 64af440 2867->2999 3000 61a8268 call 64af3e0 2867->3000 2870 61a826e-61a82ad 2954 61a82ad call 64af5bf 2870->2954 2955 61a82ad call 64af560 2870->2955 2956 61a82ad call 64af500 2870->2956 2873 61a82b3-61a832e 2957 61a832e call 64af8a0 2873->2957 2958 61a832e call 64af9a0 2873->2958 2879 61a8334-61a89b8 2951 61a89be-61a8a0d 2879->2951 2954->2873 2955->2873 2956->2873 2957->2879 2958->2879 2959->2810 2960->2810 2961->2813 2962->2813 2963->2813 2964->2813 2965->2819 2966->2819 2967->2819 2968->2819 2969->2822 2970->2822 2971->2825 2972->2825 2973->2825 2974->2828 2975->2828 2976->2828 2977->2828 2978->2831 2979->2831 2980->2837 2981->2837 2982->2837 2983->2837 2984->2840 2985->2840 2986->2840 2987->2843 2988->2843 2989->2846 2990->2846 2991->2849 2992->2849 2993->2861 2994->2861 2995->2867 2996->2867 2997->2867 2998->2870 2999->2870 3000->2870
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: e6b4b20739ec0f9b30d700a6d415a3affc1584369729c1fc62ea5880e860aef1
                                                                    • Instruction ID: 055d014a8db1d1686a895d33a90edb142fd31186dc3c10b2fc2f66f77799d5cf
                                                                    • Opcode Fuzzy Hash: e6b4b20739ec0f9b30d700a6d415a3affc1584369729c1fc62ea5880e860aef1
                                                                    • Instruction Fuzzy Hash: 1812A478902269CFDBA8DF34D98969CB7B2FF49305F1045E9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3001 61a7cee-61a7d12 3162 61a7d12 call 6476831 3001->3162 3163 61a7d12 call 64767d0 3001->3163 3005 61a7d18-61a7d57 3166 61a7d57 call 64779f7 3005->3166 3167 61a7d57 call 64773d0 3005->3167 3168 61a7d57 call 647747e 3005->3168 3169 61a7d57 call 6477998 3005->3169 3008 61a7d5d-61a7de1 3170 61a7de1 call 6477c02 3008->3170 3171 61a7de1 call 6477dcd 3008->3171 3172 61a7de1 call 6477a58 3008->3172 3173 61a7de1 call 6477ab8 3008->3173 3014 61a7de7-61a7e1d 3174 61a7e1d call 6479120 3014->3174 3175 61a7e1d call 6478b70 3014->3175 3017 61a7e23-61a7e62 3178 61a7e62 call 64a29af 3017->3178 3179 61a7e62 call 64a2950 3017->3179 3180 61a7e62 call 64a2941 3017->3180 3020 61a7e68-61a7ea7 3181 61a7ea7 call 64a2d08 3020->3181 3182 61a7ea7 call 64a2d5c 3020->3182 3183 61a7ea7 call 64a2a70 3020->3183 3184 61a7ea7 call 64a2a10 3020->3184 3023 61a7ead-61a7ee3 3188 61a7ee3 call 64a92c0 3023->3188 3189 61a7ee3 call 64a92d0 3023->3189 3026 61a7ee9-61a7f6d 3149 61a7f6d call 64aa3d8 3026->3149 3150 61a7f6d call 64aa20e 3026->3150 3151 61a7f6d call 64aa323 3026->3151 3152 61a7f6d call 64aa000 3026->3152 3032 61a7f73-61a7fb2 3153 61a7fb2 call 64aa8df 3032->3153 3154 61a7fb2 call 64aa99f 3032->3154 3155 61a7fb2 call 64aa940 3032->3155 3035 61a7fb8-61a7ff7 3158 61a7ff7 call 64aaa60 3035->3158 3159 61a7ff7 call 64aaa01 3035->3159 3038 61a7ffd-61a803c 3160 61a803c call 64aaf98 3038->3160 3161 61a803c call 64aaf97 3038->3161 3041 61a8042-61a8081 3164 61a8081 call 64ac4c8 3041->3164 3165 61a8081 call 64ac4d8 3041->3165 3044 61a8087-61a81a2 KiUserExceptionDispatcher 3176 61a81a2 call 64ad7e8 3044->3176 3177 61a81a2 call 64ad898 3044->3177 3056 61a81a8-61a8223 3185 61a8223 call 64af2cf 3056->3185 3186 61a8223 call 64af37f 3056->3186 3187 61a8223 call 64af320 3056->3187 3062 61a8229-61a8268 3190 61a8268 call 64af49f 3062->3190 3191 61a8268 call 64af440 3062->3191 3192 61a8268 call 64af3e0 3062->3192 3065 61a826e-61a82ad 3193 61a82ad call 64af5bf 3065->3193 3194 61a82ad call 64af560 3065->3194 3195 61a82ad call 64af500 3065->3195 3068 61a82b3-61a832e 3156 61a832e call 64af8a0 3068->3156 3157 61a832e call 64af9a0 3068->3157 3074 61a8334-61a89b8 3146 61a89be-61a8a0d 3074->3146 3149->3032 3150->3032 3151->3032 3152->3032 3153->3035 3154->3035 3155->3035 3156->3074 3157->3074 3158->3038 3159->3038 3160->3041 3161->3041 3162->3005 3163->3005 3164->3044 3165->3044 3166->3008 3167->3008 3168->3008 3169->3008 3170->3014 3171->3014 3172->3014 3173->3014 3174->3017 3175->3017 3176->3056 3177->3056 3178->3020 3179->3020 3180->3020 3181->3023 3182->3023 3183->3023 3184->3023 3185->3062 3186->3062 3187->3062 3188->3026 3189->3026 3190->3065 3191->3065 3192->3065 3193->3068 3194->3068 3195->3068
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 6fc1a33969afdbf80300b65ffb6f6bf770bad1747c8f181fdca3beadf619d79a
                                                                    • Instruction ID: 7ebb248f17e1abc5d26387083688acd45a5ae2c6c5916f6231158dfaf3dcaff3
                                                                    • Opcode Fuzzy Hash: 6fc1a33969afdbf80300b65ffb6f6bf770bad1747c8f181fdca3beadf619d79a
                                                                    • Instruction Fuzzy Hash: FA029378902269CFDBA8DF34D98969CB7B2FF49306F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3196 61a7d33-61a7d57 3371 61a7d57 call 64779f7 3196->3371 3372 61a7d57 call 64773d0 3196->3372 3373 61a7d57 call 647747e 3196->3373 3374 61a7d57 call 6477998 3196->3374 3200 61a7d5d-61a7de1 3375 61a7de1 call 6477c02 3200->3375 3376 61a7de1 call 6477dcd 3200->3376 3377 61a7de1 call 6477a58 3200->3377 3378 61a7de1 call 6477ab8 3200->3378 3206 61a7de7-61a7e1d 3379 61a7e1d call 6479120 3206->3379 3380 61a7e1d call 6478b70 3206->3380 3209 61a7e23-61a7e62 3383 61a7e62 call 64a29af 3209->3383 3384 61a7e62 call 64a2950 3209->3384 3385 61a7e62 call 64a2941 3209->3385 3212 61a7e68-61a7ea7 3341 61a7ea7 call 64a2d08 3212->3341 3342 61a7ea7 call 64a2d5c 3212->3342 3343 61a7ea7 call 64a2a70 3212->3343 3344 61a7ea7 call 64a2a10 3212->3344 3215 61a7ead-61a7ee3 3348 61a7ee3 call 64a92c0 3215->3348 3349 61a7ee3 call 64a92d0 3215->3349 3218 61a7ee9-61a7f6d 3356 61a7f6d call 64aa3d8 3218->3356 3357 61a7f6d call 64aa20e 3218->3357 3358 61a7f6d call 64aa323 3218->3358 3359 61a7f6d call 64aa000 3218->3359 3224 61a7f73-61a7fb2 3360 61a7fb2 call 64aa8df 3224->3360 3361 61a7fb2 call 64aa99f 3224->3361 3362 61a7fb2 call 64aa940 3224->3362 3227 61a7fb8-61a7ff7 3365 61a7ff7 call 64aaa60 3227->3365 3366 61a7ff7 call 64aaa01 3227->3366 3230 61a7ffd-61a803c 3367 61a803c call 64aaf98 3230->3367 3368 61a803c call 64aaf97 3230->3368 3233 61a8042-61a8081 3369 61a8081 call 64ac4c8 3233->3369 3370 61a8081 call 64ac4d8 3233->3370 3236 61a8087-61a81a2 KiUserExceptionDispatcher 3381 61a81a2 call 64ad7e8 3236->3381 3382 61a81a2 call 64ad898 3236->3382 3248 61a81a8-61a8223 3345 61a8223 call 64af2cf 3248->3345 3346 61a8223 call 64af37f 3248->3346 3347 61a8223 call 64af320 3248->3347 3254 61a8229-61a8268 3350 61a8268 call 64af49f 3254->3350 3351 61a8268 call 64af440 3254->3351 3352 61a8268 call 64af3e0 3254->3352 3257 61a826e-61a82ad 3353 61a82ad call 64af5bf 3257->3353 3354 61a82ad call 64af560 3257->3354 3355 61a82ad call 64af500 3257->3355 3260 61a82b3-61a832e 3363 61a832e call 64af8a0 3260->3363 3364 61a832e call 64af9a0 3260->3364 3266 61a8334-61a89b8 3338 61a89be-61a8a0d 3266->3338 3341->3215 3342->3215 3343->3215 3344->3215 3345->3254 3346->3254 3347->3254 3348->3218 3349->3218 3350->3257 3351->3257 3352->3257 3353->3260 3354->3260 3355->3260 3356->3224 3357->3224 3358->3224 3359->3224 3360->3227 3361->3227 3362->3227 3363->3266 3364->3266 3365->3230 3366->3230 3367->3233 3368->3233 3369->3236 3370->3236 3371->3200 3372->3200 3373->3200 3374->3200 3375->3206 3376->3206 3377->3206 3378->3206 3379->3209 3380->3209 3381->3248 3382->3248 3383->3212 3384->3212 3385->3212
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: add3e64ebc640551a9e2761d4de93aaa6de2534477bf7184d93af49172aa8678
                                                                    • Instruction ID: 1f9b58e6ed79867a2863cafd87e1469463a306919ece6e99ce7e117b050ce40a
                                                                    • Opcode Fuzzy Hash: add3e64ebc640551a9e2761d4de93aaa6de2534477bf7184d93af49172aa8678
                                                                    • Instruction Fuzzy Hash: E6029478902269CFDBA8DF34D98969CB7B2FF49305F1045D9D50AA2240CB3A5EC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3386 61a7d78-61a7de1 3565 61a7de1 call 6477c02 3386->3565 3566 61a7de1 call 6477dcd 3386->3566 3567 61a7de1 call 6477a58 3386->3567 3568 61a7de1 call 6477ab8 3386->3568 3393 61a7de7-61a7e1d 3528 61a7e1d call 6479120 3393->3528 3529 61a7e1d call 6478b70 3393->3529 3396 61a7e23-61a7e62 3532 61a7e62 call 64a29af 3396->3532 3533 61a7e62 call 64a2950 3396->3533 3534 61a7e62 call 64a2941 3396->3534 3399 61a7e68-61a7ea7 3535 61a7ea7 call 64a2d08 3399->3535 3536 61a7ea7 call 64a2d5c 3399->3536 3537 61a7ea7 call 64a2a70 3399->3537 3538 61a7ea7 call 64a2a10 3399->3538 3402 61a7ead-61a7ee3 3542 61a7ee3 call 64a92c0 3402->3542 3543 61a7ee3 call 64a92d0 3402->3543 3405 61a7ee9-61a7f6d 3550 61a7f6d call 64aa3d8 3405->3550 3551 61a7f6d call 64aa20e 3405->3551 3552 61a7f6d call 64aa323 3405->3552 3553 61a7f6d call 64aa000 3405->3553 3411 61a7f73-61a7fb2 3554 61a7fb2 call 64aa8df 3411->3554 3555 61a7fb2 call 64aa99f 3411->3555 3556 61a7fb2 call 64aa940 3411->3556 3414 61a7fb8-61a7ff7 3559 61a7ff7 call 64aaa60 3414->3559 3560 61a7ff7 call 64aaa01 3414->3560 3417 61a7ffd-61a803c 3561 61a803c call 64aaf98 3417->3561 3562 61a803c call 64aaf97 3417->3562 3420 61a8042-61a8081 3563 61a8081 call 64ac4c8 3420->3563 3564 61a8081 call 64ac4d8 3420->3564 3423 61a8087-61a81a2 KiUserExceptionDispatcher 3530 61a81a2 call 64ad7e8 3423->3530 3531 61a81a2 call 64ad898 3423->3531 3435 61a81a8-61a8223 3539 61a8223 call 64af2cf 3435->3539 3540 61a8223 call 64af37f 3435->3540 3541 61a8223 call 64af320 3435->3541 3441 61a8229-61a8268 3544 61a8268 call 64af49f 3441->3544 3545 61a8268 call 64af440 3441->3545 3546 61a8268 call 64af3e0 3441->3546 3444 61a826e-61a82ad 3547 61a82ad call 64af5bf 3444->3547 3548 61a82ad call 64af560 3444->3548 3549 61a82ad call 64af500 3444->3549 3447 61a82b3-61a832e 3557 61a832e call 64af8a0 3447->3557 3558 61a832e call 64af9a0 3447->3558 3453 61a8334-61a89b8 3525 61a89be-61a8a0d 3453->3525 3528->3396 3529->3396 3530->3435 3531->3435 3532->3399 3533->3399 3534->3399 3535->3402 3536->3402 3537->3402 3538->3402 3539->3441 3540->3441 3541->3441 3542->3405 3543->3405 3544->3444 3545->3444 3546->3444 3547->3447 3548->3447 3549->3447 3550->3411 3551->3411 3552->3411 3553->3411 3554->3414 3555->3414 3556->3414 3557->3453 3558->3453 3559->3417 3560->3417 3561->3420 3562->3420 3563->3423 3564->3423 3565->3393 3566->3393 3567->3393 3568->3393
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: bd71073fbcfba259e8e0d7e90f63f6ede45b644f4b50f0cdabc50aa879e43549
                                                                    • Instruction ID: d4b3b182d13d2a844e81a2fd1620590f7e95cca0184f8fd91bac2c527c996b51
                                                                    • Opcode Fuzzy Hash: bd71073fbcfba259e8e0d7e90f63f6ede45b644f4b50f0cdabc50aa879e43549
                                                                    • Instruction Fuzzy Hash: 4302A478902269CFDBA8DF34D98969CB7B2FF49305F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3569 61a7dbd-61a7de1 3731 61a7de1 call 6477c02 3569->3731 3732 61a7de1 call 6477dcd 3569->3732 3733 61a7de1 call 6477a58 3569->3733 3734 61a7de1 call 6477ab8 3569->3734 3573 61a7de7-61a7e1d 3737 61a7e1d call 6479120 3573->3737 3738 61a7e1d call 6478b70 3573->3738 3576 61a7e23-61a7e62 3739 61a7e62 call 64a29af 3576->3739 3740 61a7e62 call 64a2950 3576->3740 3741 61a7e62 call 64a2941 3576->3741 3579 61a7e68-61a7ea7 3745 61a7ea7 call 64a2d08 3579->3745 3746 61a7ea7 call 64a2d5c 3579->3746 3747 61a7ea7 call 64a2a70 3579->3747 3748 61a7ea7 call 64a2a10 3579->3748 3582 61a7ead-61a7ee3 3708 61a7ee3 call 64a92c0 3582->3708 3709 61a7ee3 call 64a92d0 3582->3709 3585 61a7ee9-61a7f6d 3716 61a7f6d call 64aa3d8 3585->3716 3717 61a7f6d call 64aa20e 3585->3717 3718 61a7f6d call 64aa323 3585->3718 3719 61a7f6d call 64aa000 3585->3719 3591 61a7f73-61a7fb2 3722 61a7fb2 call 64aa8df 3591->3722 3723 61a7fb2 call 64aa99f 3591->3723 3724 61a7fb2 call 64aa940 3591->3724 3594 61a7fb8-61a7ff7 3725 61a7ff7 call 64aaa60 3594->3725 3726 61a7ff7 call 64aaa01 3594->3726 3597 61a7ffd-61a803c 3727 61a803c call 64aaf98 3597->3727 3728 61a803c call 64aaf97 3597->3728 3600 61a8042-61a8081 3729 61a8081 call 64ac4c8 3600->3729 3730 61a8081 call 64ac4d8 3600->3730 3603 61a8087-61a81a2 KiUserExceptionDispatcher 3735 61a81a2 call 64ad7e8 3603->3735 3736 61a81a2 call 64ad898 3603->3736 3615 61a81a8-61a8223 3742 61a8223 call 64af2cf 3615->3742 3743 61a8223 call 64af37f 3615->3743 3744 61a8223 call 64af320 3615->3744 3621 61a8229-61a8268 3710 61a8268 call 64af49f 3621->3710 3711 61a8268 call 64af440 3621->3711 3712 61a8268 call 64af3e0 3621->3712 3624 61a826e-61a82ad 3713 61a82ad call 64af5bf 3624->3713 3714 61a82ad call 64af560 3624->3714 3715 61a82ad call 64af500 3624->3715 3627 61a82b3-61a832e 3720 61a832e call 64af8a0 3627->3720 3721 61a832e call 64af9a0 3627->3721 3633 61a8334-61a89b8 3705 61a89be-61a8a0d 3633->3705 3708->3585 3709->3585 3710->3624 3711->3624 3712->3624 3713->3627 3714->3627 3715->3627 3716->3591 3717->3591 3718->3591 3719->3591 3720->3633 3721->3633 3722->3594 3723->3594 3724->3594 3725->3597 3726->3597 3727->3600 3728->3600 3729->3603 3730->3603 3731->3573 3732->3573 3733->3573 3734->3573 3735->3615 3736->3615 3737->3576 3738->3576 3739->3579 3740->3579 3741->3579 3742->3621 3743->3621 3744->3621 3745->3582 3746->3582 3747->3582 3748->3582
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 1d91c2312dd69eef051763c5475730a096512ebfbba6dec51a1f64f437d6869c
                                                                    • Instruction ID: 2b297766b21bd450e70f5ba622e1b046650d3d0ea895b5a8f0196d5efd557c13
                                                                    • Opcode Fuzzy Hash: 1d91c2312dd69eef051763c5475730a096512ebfbba6dec51a1f64f437d6869c
                                                                    • Instruction Fuzzy Hash: F902A438902269CFDBA8DF34D98969CB7B2FF49345F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3749 61a7e02-61a7e1d 3896 61a7e1d call 6479120 3749->3896 3897 61a7e1d call 6478b70 3749->3897 3753 61a7e23-61a7e62 3900 61a7e62 call 64a29af 3753->3900 3901 61a7e62 call 64a2950 3753->3901 3902 61a7e62 call 64a2941 3753->3902 3756 61a7e68-61a7ea7 3903 61a7ea7 call 64a2d08 3756->3903 3904 61a7ea7 call 64a2d5c 3756->3904 3905 61a7ea7 call 64a2a70 3756->3905 3906 61a7ea7 call 64a2a10 3756->3906 3759 61a7ead-61a7ee3 3910 61a7ee3 call 64a92c0 3759->3910 3911 61a7ee3 call 64a92d0 3759->3911 3762 61a7ee9-61a7f6d 3918 61a7f6d call 64aa3d8 3762->3918 3919 61a7f6d call 64aa20e 3762->3919 3920 61a7f6d call 64aa323 3762->3920 3921 61a7f6d call 64aa000 3762->3921 3768 61a7f73-61a7fb2 3885 61a7fb2 call 64aa8df 3768->3885 3886 61a7fb2 call 64aa99f 3768->3886 3887 61a7fb2 call 64aa940 3768->3887 3771 61a7fb8-61a7ff7 3890 61a7ff7 call 64aaa60 3771->3890 3891 61a7ff7 call 64aaa01 3771->3891 3774 61a7ffd-61a803c 3892 61a803c call 64aaf98 3774->3892 3893 61a803c call 64aaf97 3774->3893 3777 61a8042-61a8081 3894 61a8081 call 64ac4c8 3777->3894 3895 61a8081 call 64ac4d8 3777->3895 3780 61a8087-61a81a2 KiUserExceptionDispatcher 3898 61a81a2 call 64ad7e8 3780->3898 3899 61a81a2 call 64ad898 3780->3899 3792 61a81a8-61a8223 3907 61a8223 call 64af2cf 3792->3907 3908 61a8223 call 64af37f 3792->3908 3909 61a8223 call 64af320 3792->3909 3798 61a8229-61a8268 3912 61a8268 call 64af49f 3798->3912 3913 61a8268 call 64af440 3798->3913 3914 61a8268 call 64af3e0 3798->3914 3801 61a826e-61a82ad 3915 61a82ad call 64af5bf 3801->3915 3916 61a82ad call 64af560 3801->3916 3917 61a82ad call 64af500 3801->3917 3804 61a82b3-61a832e 3888 61a832e call 64af8a0 3804->3888 3889 61a832e call 64af9a0 3804->3889 3810 61a8334-61a89b8 3882 61a89be-61a8a0d 3810->3882 3885->3771 3886->3771 3887->3771 3888->3810 3889->3810 3890->3774 3891->3774 3892->3777 3893->3777 3894->3780 3895->3780 3896->3753 3897->3753 3898->3792 3899->3792 3900->3756 3901->3756 3902->3756 3903->3759 3904->3759 3905->3759 3906->3759 3907->3798 3908->3798 3909->3798 3910->3762 3911->3762 3912->3801 3913->3801 3914->3801 3915->3804 3916->3804 3917->3804 3918->3768 3919->3768 3920->3768 3921->3768
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: feccebbed0e72a3ea86fb45c992f0422716225847daaa2a7ce790871e6af4170
                                                                    • Instruction ID: 09e2e83f23b4529c1c0d376f717d76f56aa6dfba475e8c34b578264b3fb0cbb8
                                                                    • Opcode Fuzzy Hash: feccebbed0e72a3ea86fb45c992f0422716225847daaa2a7ce790871e6af4170
                                                                    • Instruction Fuzzy Hash: EAF1A438902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 3922 61a7e3e-61a7e62 4072 61a7e62 call 64a29af 3922->4072 4073 61a7e62 call 64a2950 3922->4073 4074 61a7e62 call 64a2941 3922->4074 3926 61a7e68-61a7ea7 4075 61a7ea7 call 64a2d08 3926->4075 4076 61a7ea7 call 64a2d5c 3926->4076 4077 61a7ea7 call 64a2a70 3926->4077 4078 61a7ea7 call 64a2a10 3926->4078 3929 61a7ead-61a7ee3 4082 61a7ee3 call 64a92c0 3929->4082 4083 61a7ee3 call 64a92d0 3929->4083 3932 61a7ee9-61a7f6d 4055 61a7f6d call 64aa3d8 3932->4055 4056 61a7f6d call 64aa20e 3932->4056 4057 61a7f6d call 64aa323 3932->4057 4058 61a7f6d call 64aa000 3932->4058 3938 61a7f73-61a7fb2 4059 61a7fb2 call 64aa8df 3938->4059 4060 61a7fb2 call 64aa99f 3938->4060 4061 61a7fb2 call 64aa940 3938->4061 3941 61a7fb8-61a7ff7 4064 61a7ff7 call 64aaa60 3941->4064 4065 61a7ff7 call 64aaa01 3941->4065 3944 61a7ffd-61a803c 4066 61a803c call 64aaf98 3944->4066 4067 61a803c call 64aaf97 3944->4067 3947 61a8042-61a8081 4068 61a8081 call 64ac4c8 3947->4068 4069 61a8081 call 64ac4d8 3947->4069 3950 61a8087-61a81a2 KiUserExceptionDispatcher 4070 61a81a2 call 64ad7e8 3950->4070 4071 61a81a2 call 64ad898 3950->4071 3962 61a81a8-61a8223 4079 61a8223 call 64af2cf 3962->4079 4080 61a8223 call 64af37f 3962->4080 4081 61a8223 call 64af320 3962->4081 3968 61a8229-61a8268 4084 61a8268 call 64af49f 3968->4084 4085 61a8268 call 64af440 3968->4085 4086 61a8268 call 64af3e0 3968->4086 3971 61a826e-61a82ad 4087 61a82ad call 64af5bf 3971->4087 4088 61a82ad call 64af560 3971->4088 4089 61a82ad call 64af500 3971->4089 3974 61a82b3-61a832e 4062 61a832e call 64af8a0 3974->4062 4063 61a832e call 64af9a0 3974->4063 3980 61a8334-61a89b8 4052 61a89be-61a8a0d 3980->4052 4055->3938 4056->3938 4057->3938 4058->3938 4059->3941 4060->3941 4061->3941 4062->3980 4063->3980 4064->3944 4065->3944 4066->3947 4067->3947 4068->3950 4069->3950 4070->3962 4071->3962 4072->3926 4073->3926 4074->3926 4075->3929 4076->3929 4077->3929 4078->3929 4079->3968 4080->3968 4081->3968 4082->3932 4083->3932 4084->3971 4085->3971 4086->3971 4087->3974 4088->3974 4089->3974
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: fe3e1bf095f64f61b913b2ff27f376638d63578f3bd852fe4038e675a3cc27c5
                                                                    • Instruction ID: 7924d3c3d2e701c1849c16f564da3b4fe1fb1ecf48c8e7f20e2d748d36255fc2
                                                                    • Opcode Fuzzy Hash: fe3e1bf095f64f61b913b2ff27f376638d63578f3bd852fe4038e675a3cc27c5
                                                                    • Instruction Fuzzy Hash: D9F19338902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4090 61a7e83-61a7ea7 4222 61a7ea7 call 64a2d08 4090->4222 4223 61a7ea7 call 64a2d5c 4090->4223 4224 61a7ea7 call 64a2a70 4090->4224 4225 61a7ea7 call 64a2a10 4090->4225 4094 61a7ead-61a7ee3 4229 61a7ee3 call 64a92c0 4094->4229 4230 61a7ee3 call 64a92d0 4094->4230 4097 61a7ee9-61a7f6d 4237 61a7f6d call 64aa3d8 4097->4237 4238 61a7f6d call 64aa20e 4097->4238 4239 61a7f6d call 64aa323 4097->4239 4240 61a7f6d call 64aa000 4097->4240 4103 61a7f73-61a7fb2 4241 61a7fb2 call 64aa8df 4103->4241 4242 61a7fb2 call 64aa99f 4103->4242 4243 61a7fb2 call 64aa940 4103->4243 4106 61a7fb8-61a7ff7 4246 61a7ff7 call 64aaa60 4106->4246 4247 61a7ff7 call 64aaa01 4106->4247 4109 61a7ffd-61a803c 4248 61a803c call 64aaf98 4109->4248 4249 61a803c call 64aaf97 4109->4249 4112 61a8042-61a8081 4250 61a8081 call 64ac4c8 4112->4250 4251 61a8081 call 64ac4d8 4112->4251 4115 61a8087-61a81a2 KiUserExceptionDispatcher 4220 61a81a2 call 64ad7e8 4115->4220 4221 61a81a2 call 64ad898 4115->4221 4127 61a81a8-61a8223 4226 61a8223 call 64af2cf 4127->4226 4227 61a8223 call 64af37f 4127->4227 4228 61a8223 call 64af320 4127->4228 4133 61a8229-61a8268 4231 61a8268 call 64af49f 4133->4231 4232 61a8268 call 64af440 4133->4232 4233 61a8268 call 64af3e0 4133->4233 4136 61a826e-61a82ad 4234 61a82ad call 64af5bf 4136->4234 4235 61a82ad call 64af560 4136->4235 4236 61a82ad call 64af500 4136->4236 4139 61a82b3-61a832e 4244 61a832e call 64af8a0 4139->4244 4245 61a832e call 64af9a0 4139->4245 4145 61a8334-61a89b8 4217 61a89be-61a8a0d 4145->4217 4220->4127 4221->4127 4222->4094 4223->4094 4224->4094 4225->4094 4226->4133 4227->4133 4228->4133 4229->4097 4230->4097 4231->4136 4232->4136 4233->4136 4234->4139 4235->4139 4236->4139 4237->4103 4238->4103 4239->4103 4240->4103 4241->4106 4242->4106 4243->4106 4244->4145 4245->4145 4246->4109 4247->4109 4248->4112 4249->4112 4250->4115 4251->4115
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 7da782cfcc8125a9b266dbdcc2d00c60e3bc431706e67653cfaa6f5a0d5ab44a
                                                                    • Instruction ID: dd3a64cdc45d18458b780c2842f76d808136c2b10ff53a0df5d9aed987af8b8d
                                                                    • Opcode Fuzzy Hash: 7da782cfcc8125a9b266dbdcc2d00c60e3bc431706e67653cfaa6f5a0d5ab44a
                                                                    • Instruction Fuzzy Hash: 35F19438902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4252 61a7ec8-61a7ee3 4386 61a7ee3 call 64a92c0 4252->4386 4387 61a7ee3 call 64a92d0 4252->4387 4256 61a7ee9-61a7f6d 4394 61a7f6d call 64aa3d8 4256->4394 4395 61a7f6d call 64aa20e 4256->4395 4396 61a7f6d call 64aa323 4256->4396 4397 61a7f6d call 64aa000 4256->4397 4262 61a7f73-61a7fb2 4398 61a7fb2 call 64aa8df 4262->4398 4399 61a7fb2 call 64aa99f 4262->4399 4400 61a7fb2 call 64aa940 4262->4400 4265 61a7fb8-61a7ff7 4403 61a7ff7 call 64aaa60 4265->4403 4404 61a7ff7 call 64aaa01 4265->4404 4268 61a7ffd-61a803c 4405 61a803c call 64aaf98 4268->4405 4406 61a803c call 64aaf97 4268->4406 4271 61a8042-61a8081 4379 61a8081 call 64ac4c8 4271->4379 4380 61a8081 call 64ac4d8 4271->4380 4274 61a8087-61a81a2 KiUserExceptionDispatcher 4381 61a81a2 call 64ad7e8 4274->4381 4382 61a81a2 call 64ad898 4274->4382 4286 61a81a8-61a8223 4383 61a8223 call 64af2cf 4286->4383 4384 61a8223 call 64af37f 4286->4384 4385 61a8223 call 64af320 4286->4385 4292 61a8229-61a8268 4388 61a8268 call 64af49f 4292->4388 4389 61a8268 call 64af440 4292->4389 4390 61a8268 call 64af3e0 4292->4390 4295 61a826e-61a82ad 4391 61a82ad call 64af5bf 4295->4391 4392 61a82ad call 64af560 4295->4392 4393 61a82ad call 64af500 4295->4393 4298 61a82b3-61a832e 4401 61a832e call 64af8a0 4298->4401 4402 61a832e call 64af9a0 4298->4402 4304 61a8334-61a89b8 4376 61a89be-61a8a0d 4304->4376 4379->4274 4380->4274 4381->4286 4382->4286 4383->4292 4384->4292 4385->4292 4386->4256 4387->4256 4388->4295 4389->4295 4390->4295 4391->4298 4392->4298 4393->4298 4394->4262 4395->4262 4396->4262 4397->4262 4398->4265 4399->4265 4400->4265 4401->4304 4402->4304 4403->4268 4404->4268 4405->4271 4406->4271
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 6afec4b41eb4ccc079afa873c0160484d4409b74fbf2a878c830bed11598283d
                                                                    • Instruction ID: 6c5948ee3bb826eb5331ed0f40a0be26a7cc20852d95feec8e94735ff4a2d253
                                                                    • Opcode Fuzzy Hash: 6afec4b41eb4ccc079afa873c0160484d4409b74fbf2a878c830bed11598283d
                                                                    • Instruction Fuzzy Hash: 1EF1A438902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4407 61a7f04-61a7f6d 4542 61a7f6d call 64aa3d8 4407->4542 4543 61a7f6d call 64aa20e 4407->4543 4544 61a7f6d call 64aa323 4407->4544 4545 61a7f6d call 64aa000 4407->4545 4414 61a7f73-61a7fb2 4546 61a7fb2 call 64aa8df 4414->4546 4547 61a7fb2 call 64aa99f 4414->4547 4548 61a7fb2 call 64aa940 4414->4548 4417 61a7fb8-61a7ff7 4551 61a7ff7 call 64aaa60 4417->4551 4552 61a7ff7 call 64aaa01 4417->4552 4420 61a7ffd-61a803c 4553 61a803c call 64aaf98 4420->4553 4554 61a803c call 64aaf97 4420->4554 4423 61a8042-61a8081 4555 61a8081 call 64ac4c8 4423->4555 4556 61a8081 call 64ac4d8 4423->4556 4426 61a8087-61a81a2 KiUserExceptionDispatcher 4531 61a81a2 call 64ad7e8 4426->4531 4532 61a81a2 call 64ad898 4426->4532 4438 61a81a8-61a8223 4533 61a8223 call 64af2cf 4438->4533 4534 61a8223 call 64af37f 4438->4534 4535 61a8223 call 64af320 4438->4535 4444 61a8229-61a8268 4536 61a8268 call 64af49f 4444->4536 4537 61a8268 call 64af440 4444->4537 4538 61a8268 call 64af3e0 4444->4538 4447 61a826e-61a82ad 4539 61a82ad call 64af5bf 4447->4539 4540 61a82ad call 64af560 4447->4540 4541 61a82ad call 64af500 4447->4541 4450 61a82b3-61a832e 4549 61a832e call 64af8a0 4450->4549 4550 61a832e call 64af9a0 4450->4550 4456 61a8334-61a89b8 4528 61a89be-61a8a0d 4456->4528 4531->4438 4532->4438 4533->4444 4534->4444 4535->4444 4536->4447 4537->4447 4538->4447 4539->4450 4540->4450 4541->4450 4542->4414 4543->4414 4544->4414 4545->4414 4546->4417 4547->4417 4548->4417 4549->4456 4550->4456 4551->4420 4552->4420 4553->4423 4554->4423 4555->4426 4556->4426
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 991c1b5f75ad93189ffa9382807a1b36e4113eef3a74385e7d32348a02a7ff01
                                                                    • Instruction ID: 15f7e9d012a1312d8d3fae0cc767d1788bfe4f1e876d9b3460a9c912a8b8826b
                                                                    • Opcode Fuzzy Hash: 991c1b5f75ad93189ffa9382807a1b36e4113eef3a74385e7d32348a02a7ff01
                                                                    • Instruction Fuzzy Hash: 70F1A438902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4557 61a7f49-61a7f6d 4689 61a7f6d call 64aa3d8 4557->4689 4690 61a7f6d call 64aa20e 4557->4690 4691 61a7f6d call 64aa323 4557->4691 4692 61a7f6d call 64aa000 4557->4692 4561 61a7f73-61a7fb2 4693 61a7fb2 call 64aa8df 4561->4693 4694 61a7fb2 call 64aa99f 4561->4694 4695 61a7fb2 call 64aa940 4561->4695 4564 61a7fb8-61a7ff7 4698 61a7ff7 call 64aaa60 4564->4698 4699 61a7ff7 call 64aaa01 4564->4699 4567 61a7ffd-61a803c 4700 61a803c call 64aaf98 4567->4700 4701 61a803c call 64aaf97 4567->4701 4570 61a8042-61a8081 4702 61a8081 call 64ac4c8 4570->4702 4703 61a8081 call 64ac4d8 4570->4703 4573 61a8087-61a81a2 KiUserExceptionDispatcher 4678 61a81a2 call 64ad7e8 4573->4678 4679 61a81a2 call 64ad898 4573->4679 4585 61a81a8-61a8223 4680 61a8223 call 64af2cf 4585->4680 4681 61a8223 call 64af37f 4585->4681 4682 61a8223 call 64af320 4585->4682 4591 61a8229-61a8268 4683 61a8268 call 64af49f 4591->4683 4684 61a8268 call 64af440 4591->4684 4685 61a8268 call 64af3e0 4591->4685 4594 61a826e-61a82ad 4686 61a82ad call 64af5bf 4594->4686 4687 61a82ad call 64af560 4594->4687 4688 61a82ad call 64af500 4594->4688 4597 61a82b3-61a832e 4696 61a832e call 64af8a0 4597->4696 4697 61a832e call 64af9a0 4597->4697 4603 61a8334-61a89b8 4675 61a89be-61a8a0d 4603->4675 4678->4585 4679->4585 4680->4591 4681->4591 4682->4591 4683->4594 4684->4594 4685->4594 4686->4597 4687->4597 4688->4597 4689->4561 4690->4561 4691->4561 4692->4561 4693->4564 4694->4564 4695->4564 4696->4603 4697->4603 4698->4567 4699->4567 4700->4570 4701->4570 4702->4573 4703->4573
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 09fbe3cdb8e0da32d60d290b065b93eaceed56284801b7c33d8826622499c17b
                                                                    • Instruction ID: df01a752649a176375d4b2ae0598e1ae5602e44359f2a2e9a2bc7238dd3c8b03
                                                                    • Opcode Fuzzy Hash: 09fbe3cdb8e0da32d60d290b065b93eaceed56284801b7c33d8826622499c17b
                                                                    • Instruction Fuzzy Hash: D5E1A438902229CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4704 61a7f8e-61a7fb2 4835 61a7fb2 call 64aa8df 4704->4835 4836 61a7fb2 call 64aa99f 4704->4836 4837 61a7fb2 call 64aa940 4704->4837 4708 61a7fb8-61a7ff7 4840 61a7ff7 call 64aaa60 4708->4840 4841 61a7ff7 call 64aaa01 4708->4841 4711 61a7ffd-61a803c 4842 61a803c call 64aaf98 4711->4842 4843 61a803c call 64aaf97 4711->4843 4714 61a8042-61a8081 4822 61a8081 call 64ac4c8 4714->4822 4823 61a8081 call 64ac4d8 4714->4823 4717 61a8087-61a81a2 KiUserExceptionDispatcher 4824 61a81a2 call 64ad7e8 4717->4824 4825 61a81a2 call 64ad898 4717->4825 4729 61a81a8-61a8223 4826 61a8223 call 64af2cf 4729->4826 4827 61a8223 call 64af37f 4729->4827 4828 61a8223 call 64af320 4729->4828 4735 61a8229-61a8268 4829 61a8268 call 64af49f 4735->4829 4830 61a8268 call 64af440 4735->4830 4831 61a8268 call 64af3e0 4735->4831 4738 61a826e-61a82ad 4832 61a82ad call 64af5bf 4738->4832 4833 61a82ad call 64af560 4738->4833 4834 61a82ad call 64af500 4738->4834 4741 61a82b3-61a832e 4838 61a832e call 64af8a0 4741->4838 4839 61a832e call 64af9a0 4741->4839 4747 61a8334-61a89b8 4819 61a89be-61a8a0d 4747->4819 4822->4717 4823->4717 4824->4729 4825->4729 4826->4735 4827->4735 4828->4735 4829->4738 4830->4738 4831->4738 4832->4741 4833->4741 4834->4741 4835->4708 4836->4708 4837->4708 4838->4747 4839->4747 4840->4711 4841->4711 4842->4714 4843->4714
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 831732f08d0c846b850abeba5c26529d046c151f08af746101cc7692e479826f
                                                                    • Instruction ID: fb0f04500e5953570bf6d5a0450f6c44bc0b6c65cde33d44c4ccfa279125a58c
                                                                    • Opcode Fuzzy Hash: 831732f08d0c846b850abeba5c26529d046c151f08af746101cc7692e479826f
                                                                    • Instruction Fuzzy Hash: 55E1A538902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB395AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4844 61a7fd3-61a7ff7 4961 61a7ff7 call 64aaa60 4844->4961 4962 61a7ff7 call 64aaa01 4844->4962 4848 61a7ffd-61a803c 4963 61a803c call 64aaf98 4848->4963 4964 61a803c call 64aaf97 4848->4964 4851 61a8042-61a8081 4965 61a8081 call 64ac4c8 4851->4965 4966 61a8081 call 64ac4d8 4851->4966 4854 61a8087-61a81a2 KiUserExceptionDispatcher 4967 61a81a2 call 64ad7e8 4854->4967 4968 61a81a2 call 64ad898 4854->4968 4866 61a81a8-61a8223 4969 61a8223 call 64af2cf 4866->4969 4970 61a8223 call 64af37f 4866->4970 4971 61a8223 call 64af320 4866->4971 4872 61a8229-61a8268 4972 61a8268 call 64af49f 4872->4972 4973 61a8268 call 64af440 4872->4973 4974 61a8268 call 64af3e0 4872->4974 4875 61a826e-61a82ad 4975 61a82ad call 64af5bf 4875->4975 4976 61a82ad call 64af560 4875->4976 4977 61a82ad call 64af500 4875->4977 4878 61a82b3-61a832e 4959 61a832e call 64af8a0 4878->4959 4960 61a832e call 64af9a0 4878->4960 4884 61a8334-61a89b8 4956 61a89be-61a8a0d 4884->4956 4959->4884 4960->4884 4961->4848 4962->4848 4963->4851 4964->4851 4965->4854 4966->4854 4967->4866 4968->4866 4969->4872 4970->4872 4971->4872 4972->4875 4973->4875 4974->4875 4975->4878 4976->4878 4977->4878
                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 82d2a6cfe07db3265ca37c3deecb4e65dd7d1d912fada8689cecaca5e35423ce
                                                                    • Instruction ID: d92c429a4a062110a1e6cfded1154cdb4e8aa23b2ff6362e7aab5b43244a9d37
                                                                    • Opcode Fuzzy Hash: 82d2a6cfe07db3265ca37c3deecb4e65dd7d1d912fada8689cecaca5e35423ce
                                                                    • Instruction Fuzzy Hash: 7BE1A438902229CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB399AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: cc8abce7b562f2b875c686d0407b8dee3e099b62081892994b6aaf882ce6071f
                                                                    • Instruction ID: 6e964b248e7d987a75150bc5062e21bdfd4b945530a0b4a0efb0e6dd2a97eb1b
                                                                    • Opcode Fuzzy Hash: cc8abce7b562f2b875c686d0407b8dee3e099b62081892994b6aaf882ce6071f
                                                                    • Instruction Fuzzy Hash: 67E1A438902269CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 7f8da27d145bf6dfc9728920c1d7a1996a4f8169b9fab80190754f491ef05b96
                                                                    • Instruction ID: e39eb5232192dc89285a618ead313aafbdc5eb1bb2d7d412c2920a23ed7f8624
                                                                    • Opcode Fuzzy Hash: 7f8da27d145bf6dfc9728920c1d7a1996a4f8169b9fab80190754f491ef05b96
                                                                    • Instruction Fuzzy Hash: B7D1B438902229CFDBA8DF34D98969CB7B2FF45306F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: e09334e0374e00125c47b6e6f27a6b747cd4a92707866f9d15c728255a5dedd8
                                                                    • Instruction ID: 48598aca89e869107c1f5e43705f5797c8c1a7f93b144d442ec16c545a68c3c4
                                                                    • Opcode Fuzzy Hash: e09334e0374e00125c47b6e6f27a6b747cd4a92707866f9d15c728255a5dedd8
                                                                    • Instruction Fuzzy Hash: A8D1A438906229CFDBA8DF34D98969CB7B2FF45346F1045D9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: f8b046b8d0a4b0b1336f4ee5f5a607238dad6a83be3912f8894d9e6276b5a828
                                                                    • Instruction ID: af38fa28948e84a4fa08c92f9b1da38b5535efd969660909e04282301284bf62
                                                                    • Opcode Fuzzy Hash: f8b046b8d0a4b0b1336f4ee5f5a607238dad6a83be3912f8894d9e6276b5a828
                                                                    • Instruction Fuzzy Hash: 94D1B438906229CFDBA8DF34D98969CB7B2FF45346F1045E9D50AA2340CB3A5AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserExceptionDispatcher.NTDLL ref: 061A8147
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.578869748.00000000061A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_61a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DispatcherExceptionUser
                                                                    • String ID:
                                                                    • API String ID: 6842923-0
                                                                    • Opcode ID: 95c9e322d28c9de4b9fcc4c69cb68d30d7048017f923f1b492d29daf6a23a003
                                                                    • Instruction ID: 5431a4af20fb26ddc76cb95b3158b89c1c52776e11f8d12a45f660b2a1cc1284
                                                                    • Opcode Fuzzy Hash: 95c9e322d28c9de4b9fcc4c69cb68d30d7048017f923f1b492d29daf6a23a003
                                                                    • Instruction Fuzzy Hash: ACC1B438906229CFDBA8DF34D98969CB7B2FF49346F1045D9D50AA2340CB355AC1DF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.571958025.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_12bd000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d53f77b9aa5107c0371f97b0cd0809642554208546ce20e2cc5ff2129caf4e1f
                                                                    • Instruction ID: d310b77eb9da1e1307d5f44dc8e6cb19bdf2c6e07d281a455a27084d2fb8191c
                                                                    • Opcode Fuzzy Hash: d53f77b9aa5107c0371f97b0cd0809642554208546ce20e2cc5ff2129caf4e1f
                                                                    • Instruction Fuzzy Hash: 0372372605E7C64FD3234BB48DA16C27FB0AF13224B0E89DBD5C0CB5A3D21D9A59D762
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: 7a3bb95c46549c9ef7ed6551b4e25c1e5f4739181c9848c0a11372956d38f895
                                                                    • Instruction ID: 3fe532364427d72e0d109d9fb950506da7307751b168df1163ef2215d8e2c0c8
                                                                    • Opcode Fuzzy Hash: 7a3bb95c46549c9ef7ed6551b4e25c1e5f4739181c9848c0a11372956d38f895
                                                                    • Instruction Fuzzy Hash: E551B130A00305AFDB50EFB4D948AAFB7A6FF84215F108969E4069B745EF34DD09CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InitializeThunk
                                                                    • String ID:
                                                                    • API String ID: 2994545307-0
                                                                    • Opcode ID: 8c117b634ff1b9b7b49b55f932cf27b838402281934603cb0dca8db3a4af6958
                                                                    • Instruction ID: 00b7a8cae1364a9fb6d71b966f84757e80a6c612d710685e34e3e07821862e93
                                                                    • Opcode Fuzzy Hash: 8c117b634ff1b9b7b49b55f932cf27b838402281934603cb0dca8db3a4af6958
                                                                    • Instruction Fuzzy Hash: 79519531E00205AFCB54EFB4D948AAFB7A6FF84215F108929E5129B754DF34ED08CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 064ACB59
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue
                                                                    • String ID:
                                                                    • API String ID: 3660427363-0
                                                                    • Opcode ID: 352fc11ce620a3bd00241e7eb9801d3b875180871939f9a919e25a58dccb55fc
                                                                    • Instruction ID: af361d8f641eab64f202a42ce517604d246e69448aaf8a33f7041fa66b8e6261
                                                                    • Opcode Fuzzy Hash: 352fc11ce620a3bd00241e7eb9801d3b875180871939f9a919e25a58dccb55fc
                                                                    • Instruction Fuzzy Hash: DA4132B0E00358AFCB50CFA9D884A9EBFF5AF48344F54816AE819AB310D7759805CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 064AC89C
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: ffcd2bd447d42a2f5b871df3b075eb4022cd9bde60618f45c0b2d65274b2c4d6
                                                                    • Instruction ID: 368a5f14ccbfa57861f2eecfcf67df0c089ceb8723fc05228f12ccaee8519c8c
                                                                    • Opcode Fuzzy Hash: ffcd2bd447d42a2f5b871df3b075eb4022cd9bde60618f45c0b2d65274b2c4d6
                                                                    • Instruction Fuzzy Hash: EF4145B0D013499FDB51CFA8C584A9EBBF5BF48304F25856AE808AB341D7749849CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 064ACB59
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue
                                                                    • String ID:
                                                                    • API String ID: 3660427363-0
                                                                    • Opcode ID: 072747efa8ed7952d6298bf018c8f2f9cfcc17c31f1e661196aad7a6eef8ebc8
                                                                    • Instruction ID: 622bfe82b3c49329a824288beee8085485386903f94fd8ff663bc7400bf192a1
                                                                    • Opcode Fuzzy Hash: 072747efa8ed7952d6298bf018c8f2f9cfcc17c31f1e661196aad7a6eef8ebc8
                                                                    • Instruction Fuzzy Hash: 8831EFB1D00358EFCB60CFAAD984A9EBBF5BF48310F54812AE819AB310D7759905CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 064AC89C
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.579104491.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_64a0000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: 33ecdc6dbf610273e6d485313e3cefe53b71a907831c48875ba289341e373f4e
                                                                    • Instruction ID: f815f6795255cfd31081e892d85553cc6c2a29363d6b2c5ffe2def1eec9f09d1
                                                                    • Opcode Fuzzy Hash: 33ecdc6dbf610273e6d485313e3cefe53b71a907831c48875ba289341e373f4e
                                                                    • Instruction Fuzzy Hash: EC31EFB1D00349DFDB50CF99C684A8EFBF5BF48304F24856AE809AB341C7759985CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.571958025.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_12bd000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d02faa583cb267c2536901e8d9c518e775feece96dc9029b5be0c882926d288e
                                                                    • Instruction ID: 5d0f36582d47ba95ae390a6be2a991a445ddeda44707ca072bf713b1384f1bc1
                                                                    • Opcode Fuzzy Hash: d02faa583cb267c2536901e8d9c518e775feece96dc9029b5be0c882926d288e
                                                                    • Instruction Fuzzy Hash: 83916D7604A7C19FD3134FA48D916C17FB0EF17320F1E89DBD9C08A2A3D22A9959D762
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.571913765.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c2d78c35bc6036c91f382c9a08354cc9243a2843c27db99679c15f07f12aef35
                                                                    • Instruction ID: c2af03f292e72eeb7b3605524320ec7dfe592c27af4c6f98e028b4cdf1303a40
                                                                    • Opcode Fuzzy Hash: c2d78c35bc6036c91f382c9a08354cc9243a2843c27db99679c15f07f12aef35
                                                                    • Instruction Fuzzy Hash: 19214571510208DFDB01DF94D9C0BA6BB61FB84324F60C979E9090BB06C33AE84ACBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.571958025.00000000012BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_12bd000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3139b017dc61d08e2bc83a2e6e50f295ce3bf5642a322a9c449b1a5d2bf81a9c
                                                                    • Instruction ID: c8f525211362422a7afacdf7978762841298ff082defa0154951efec60c7dc01
                                                                    • Opcode Fuzzy Hash: 3139b017dc61d08e2bc83a2e6e50f295ce3bf5642a322a9c449b1a5d2bf81a9c
                                                                    • Instruction Fuzzy Hash: E4213475614204EFCB05CF24D9C4BA6BB71FB84364F24C969DA494B346C37ED84ACBA2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.571913765.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e95a58f6c018f3728783d1a413ec92afad62c72efd4f494350a5dd109fd946cf
                                                                    • Instruction ID: 3a1aa0d943ca6d9b98cde484e4c93fdc9eb5acf8b072294fef95c710e785c8e2
                                                                    • Opcode Fuzzy Hash: e95a58f6c018f3728783d1a413ec92afad62c72efd4f494350a5dd109fd946cf
                                                                    • Instruction Fuzzy Hash: B311D376504284DFCB12CF54D5C4B56BF72FB84320F24C6A9D9484BA16C33AE456CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%