Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe

Overview

General Information

Sample name:SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Analysis ID:1552474
MD5:d259c61b387fcd39b3ab83dd9ee1fc26
SHA1:e53aea122c350a2e569dfaa587cfe5af6c3fb0a4
SHA256:616ed7e97dd87be83b59ad3fa6df8285f35b62dbe913e8d73b1ea798a6021261
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-08T20:31:00.054930+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449738TCP
2024-11-08T20:31:38.248695+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449744TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeReversingLabs: Detection: 28%
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \PlugMan\PlugMan\obj\Debug\PlugMan.pdb+T source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: Binary string: \PlugMan\PlugMan\obj\Debug\PlugMan.pdb source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 4x nop then lea ecx, dword ptr [ebp-000000BCh]0_2_09319F11
Source: global trafficHTTP traffic detected: GET /public/F_list.ini HTTP/1.1Host: 159.100.29.29Connection: Keep-Alive
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49738
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49744
Source: unknownTCP traffic detected without corresponding DNS query: 80.78.246.154
Source: unknownTCP traffic detected without corresponding DNS query: 80.78.246.154
Source: unknownTCP traffic detected without corresponding DNS query: 80.78.246.154
Source: unknownTCP traffic detected without corresponding DNS query: 80.78.246.154
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 80.78.246.154
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: unknownTCP traffic detected without corresponding DNS query: 159.100.29.29
Source: global trafficHTTP traffic detected: GET /public/F_list.ini HTTP/1.1Host: 159.100.29.29Connection: Keep-Alive
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003034000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://159.100.29.29
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://159.100.29.29/public/
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.000000000302D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://159.100.29.29/public/F_list.ini
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003034000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003044000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://159.100.29.29/public/F_list.iniP
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003044000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://159.100.29.29d
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://80.78.246.154
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://80.78.246.154/public/
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeString found in binary or memory: http://80.78.246.154/public/9http://159.100.29.29/public/
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://80.78.246.154/public/F_list.ini
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://80.78.246.154/public/F_list.iniP
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507226515.0000000005FF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_05400C880_2_05400C88
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_05401A400_2_05401A40
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_05401A500_2_05401A50
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_077084D10_2_077084D1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_077043540_2_07704354
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_093188F00_2_093188F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931B5D00_2_0931B5D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_093196880_2_09319688
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_093188E00_2_093188E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931B3F00_2_0931B3F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931B5C00_2_0931B5C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931D4780_2_0931D478
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931D4690_2_0931D469
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931C7900_2_0931C790
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_0931C7810_2_0931C781
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_093196790_2_09319679
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000000.1644516326.0000000000B22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePlugMan.exe0 vs SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3505566845.00000000012BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeBinary or memory string: OriginalFilenamePlugMan.exe0 vs SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: classification engineClassification label: mal48.winEXE@1/2@0/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeFile created: C:\Users\user\AppData\Roaming\BimStepJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeMutant created: NULL
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeFile read: C:\Users\user\Desktop\Flistnew.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeReversingLabs: Detection: 28%
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeFile written: C:\Users\user\Desktop\Flistnew.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \PlugMan\PlugMan\obj\Debug\PlugMan.pdb+T source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: Binary string: \PlugMan\PlugMan\obj\Debug\PlugMan.pdb source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: 0xFF0CC677 [Thu Aug 6 18:41:59 2105 UTC]
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeCode function: 0_2_07702520 push esp; iretd 0_2_07702521
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeStatic PE information: section name: .text entropy: 7.458103899462974
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeMemory allocated: 1290000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeMemory allocated: 1540000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe TID: 7580Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe TID: 7580Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeThread delayed: delay time: 600000Jump to behavior
Source: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3505803421.0000000001393000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe29%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://80.78.246.154/public/0%Avira URL Cloudsafe
http://80.78.246.154/public/F_list.iniP0%Avira URL Cloudsafe
http://159.100.29.29/public/F_list.iniP0%Avira URL Cloudsafe
http://80.78.246.154/public/9http://159.100.29.29/public/0%Avira URL Cloudsafe
http://159.100.29.29/public/0%Avira URL Cloudsafe
http://80.78.246.1540%Avira URL Cloudsafe
http://159.100.29.29d0%Avira URL Cloudsafe
http://159.100.29.29/public/F_list.ini0%Avira URL Cloudsafe
http://80.78.246.154/public/F_list.ini0%Avira URL Cloudsafe
http://159.100.29.290%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://159.100.29.29/public/F_list.inifalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://80.78.246.154/public/9http://159.100.29.29/public/SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exefalse
          • Avira URL Cloud: safe
          unknown
          http://www.founder.com.cn/cn/bTheSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://80.78.246.154/public/SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002F21000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designers?SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://159.100.29.29/public/SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002F21000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.krSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://80.78.246.154/public/F_list.iniPSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://80.78.246.154SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://159.100.29.29SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003034000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://159.100.29.29/public/F_list.iniPSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003034000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003044000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comlSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sajatypeworks.comSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.typography.netDSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cnSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://80.78.246.154/public/F_list.iniSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers8SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://159.100.29.29dSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000003044000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fonts.comSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.urwpp.deDPleaseSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.zhongyicts.com.cnSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3506173187.0000000002FF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sakkal.comSecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507244356.00000000070C2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe, 00000000.00000002.3507226515.0000000005FF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      80.78.246.154
                                                      unknownRussian Federation
                                                      43146AGAVA3RUfalse
                                                      159.100.29.29
                                                      unknownGermany
                                                      203833AT-FIRSTCOLOAustriaATfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1552474
                                                      Start date and time:2024-11-08 20:29:52 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 13s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Run name:Run with higher sleep bypass
                                                      Number of analysed new started processes analysed:6
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      Detection:MAL
                                                      Classification:mal48.winEXE@1/2@0/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 44
                                                      • Number of non-executed functions: 10
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      • VT rate limit hit for: SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      No simulations
                                                      No context
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      AGAVA3RUhttp://puzzlewood.netGet hashmaliciousUnknownBrowse
                                                      • 89.108.119.28
                                                      yakov.mips.elfGet hashmaliciousMiraiBrowse
                                                      • 89.108.102.237
                                                      http://www.goo.su/c1Rnox/Get hashmaliciousUnknownBrowse
                                                      • 89.108.119.43
                                                      https://dolshepsi.ru/assets/images/dh/GlobalSources/index.php/Get hashmaliciousHTMLPhisherBrowse
                                                      • 89.108.85.64
                                                      http://xn--r1a.website/s/ogorodruGet hashmaliciousUnknownBrowse
                                                      • 89.108.119.28
                                                      http://www.goo.su/fJu2F/Get hashmaliciousUnknownBrowse
                                                      • 89.108.120.68
                                                      http://vidaliaonion.orgGet hashmaliciousUnknownBrowse
                                                      • 89.108.120.76
                                                      http://stream.crichd.vip/update/sscricket.phpGet hashmaliciousUnknownBrowse
                                                      • 89.108.119.43
                                                      https://lenta.ru/articles/2023/01/13/darkpr/Get hashmaliciousHTMLPhisherBrowse
                                                      • 89.108.120.68
                                                      AT-FIRSTCOLOAustriaATboatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      YIztve8dU8.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      fSLSu3PQPC.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      3kMnPQIVHR.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      F4ged15cJ3.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      cZlRw8OG35.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      j0GmmzdQRz.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      VWpmyBcWBO.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      KBW66LEndt.elfGet hashmaliciousMiraiBrowse
                                                      • 79.133.46.243
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):14
                                                      Entropy (8bit):3.2359263506290334
                                                      Encrypted:false
                                                      SSDEEP:3:Bcn:+
                                                      MD5:5EFAD9751B81AC353C2774A58A0BE0FD
                                                      SHA1:D5D6BFFDFA7D7B10B37AB8A099A3BAC6DCFA8684
                                                      SHA-256:52F0327ECD5E40CF50C393FB2D09C7CA0B5CC2E4B757A26CDD02CA4258A1DFEF
                                                      SHA-512:FC21C7726E766B808A3F5746ACD281D00C473177857BF18B5463926505472E9AE62CCE5D25E95396501B89521454AD8DD184458E320974C4421EF8E2DF9D186F
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:Language..RU..
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      File Type:Unicode text, UTF-8 (with BOM) text
                                                      Category:dropped
                                                      Size (bytes):4217
                                                      Entropy (8bit):5.5869798989771
                                                      Encrypted:false
                                                      SSDEEP:48:80jgj03zxAoqOOVU/Mg1jg1VZjeBtoMJNt3sqwAv/0dWgr8LJ8ZiK9KoKyparIBH:ZjqXrVUnMVZjXEL8zoMIWqCtEoEQH
                                                      MD5:CCAFD2665104854C6AFB571B8D316E63
                                                      SHA1:A38B4976E9A22389A92B9E675028CDD1946089F1
                                                      SHA-256:30C48CF527D489A327957FC342D6931F517B72F6A2A05D86D06D176EF1994E2D
                                                      SHA-512:763B41910B8A8D48458DD05B0C5309D25AF572D979B1C78913F4E439EB401826F88463F238E987C0B286E8965FB7E0FCF2B6B1ABE0B85C6A2677AA1C4E26B57E
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.[Section].Name=PlugMan.Description="........ ........".Date=04.10.2023 12:00.Version=*.[File].URL=Plugman/PlugMan.exe.Name=PlugMan.exe.Path=*..[Section].Name=BimStep_...Description="............. .......".Date=29.10.2024 14:00.Version=2019,2020,2021,2022,2023,2024,2025.HistoryURL=BimStep_...txt.[File].URL=%Version%/BimStep_../BimStep_...addin.Name=BimStep_...addin.Path=%AppData%\Autodesk\Revit\Addins\%Version%.[File].URL=%Version%/BimStep_../BimStep_...dll.Name=BimStep_...dll.Path=%AppData%\Autodesk\Revit\Addins\%Version%..[Section].Name=BimStep_....Description=".......... ............ . ....".Date=01.10.2024 13:00.Version=2019,2020,2021,2022,2023,2024,2025.HistoryURL=BimStep_....txt.[File].URL=%Version%/BimStep_.../BimStep_....addin.Name=BimStep_....addin.Path=%AppData%\Autodesk\Revit\Addins\%Version%.[File].URL=%Version%/BimStep_.../BimStep_....dll.Name=BimStep_....dll.Path=%AppD
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.43497282842813
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      File size:278'528 bytes
                                                      MD5:d259c61b387fcd39b3ab83dd9ee1fc26
                                                      SHA1:e53aea122c350a2e569dfaa587cfe5af6c3fb0a4
                                                      SHA256:616ed7e97dd87be83b59ad3fa6df8285f35b62dbe913e8d73b1ea798a6021261
                                                      SHA512:c861ad697fc9b76d0cabb9cc0411523f2bd0ccffd0b381217b49eb28fbd0af9f4fb6417ee4998556befde590fc092294ea68398fe61f5a30b3bb68dc44629bc0
                                                      SSDEEP:6144:15eNsZqK0jLVDdlqIcGFJsVgLbZOvoHizVKoSi2MGGf:DMscNdq8CmZWoHoVFSi2MG
                                                      TLSH:DE44CF063660CE5EEFFD03F1D8E526D213AC881AC615E25FBDF238A979B97804604D67
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...w............."...0..6..........VT... ...`....@.. ....................................`................................
                                                      Icon Hash:90cececece8e8eb0
                                                      Entrypoint:0x445456
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0xFF0CC677 [Thu Aug 6 18:41:59 2105 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x454030x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x59c.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x453640x38.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x4345c0x436008374dec81e1e40c2bd1ae14172aad4efFalse0.6088713184137291data7.458103899462974IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x460000x59c0x60051dab4d518e89fe237ea8853abb2ea72False0.4108072916666667data4.0542235385711605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x480000xc0x200d1a6f9453fa95b027d3c98aec16b7030False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0x460900x30cdata0.4230769230769231
                                                      RT_MANIFEST0x463ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-11-08T20:31:00.054930+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449738TCP
                                                      2024-11-08T20:31:38.248695+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449744TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 8, 2024 20:30:41.680810928 CET4973280192.168.2.480.78.246.154
                                                      Nov 8, 2024 20:30:41.685853004 CET804973280.78.246.154192.168.2.4
                                                      Nov 8, 2024 20:30:41.685981989 CET4973280192.168.2.480.78.246.154
                                                      Nov 8, 2024 20:30:41.686608076 CET4973280192.168.2.480.78.246.154
                                                      Nov 8, 2024 20:30:41.691418886 CET804973280.78.246.154192.168.2.4
                                                      Nov 8, 2024 20:30:42.254442930 CET4973280192.168.2.480.78.246.154
                                                      Nov 8, 2024 20:30:42.263046980 CET4973380192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.268131971 CET8049733159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.268224001 CET4973380192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.271281004 CET4973380192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.276129007 CET8049733159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.306770086 CET804973280.78.246.154192.168.2.4
                                                      Nov 8, 2024 20:30:42.309967995 CET804973280.78.246.154192.168.2.4
                                                      Nov 8, 2024 20:30:42.310019970 CET4973280192.168.2.480.78.246.154
                                                      Nov 8, 2024 20:30:42.769515991 CET4973380192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.772847891 CET4973480192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.778800011 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.778938055 CET4973480192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.779027939 CET4973480192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:42.783988953 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.814668894 CET8049733159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.869220972 CET8049733159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:42.869327068 CET4973380192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:43.695795059 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:43.695815086 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:43.695827007 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:43.695842981 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:43.695857048 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:43.695995092 CET4973480192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:43.695996046 CET4973480192.168.2.4159.100.29.29
                                                      Nov 8, 2024 20:30:48.818382978 CET8049734159.100.29.29192.168.2.4
                                                      Nov 8, 2024 20:30:48.818454027 CET4973480192.168.2.4159.100.29.29
                                                      • 159.100.29.29
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.44973280.78.246.154807404C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 8, 2024 20:30:41.686608076 CET81OUTHEAD /public/F_list.ini HTTP/1.1
                                                      Host: 80.78.246.154
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.449733159.100.29.29807404C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 8, 2024 20:30:42.271281004 CET81OUTHEAD /public/F_list.ini HTTP/1.1
                                                      Host: 159.100.29.29
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.449734159.100.29.29807404C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 8, 2024 20:30:42.779027939 CET80OUTGET /public/F_list.ini HTTP/1.1
                                                      Host: 159.100.29.29
                                                      Connection: Keep-Alive
                                                      Nov 8, 2024 20:30:43.695795059 CET1236INHTTP/1.1 200 OK
                                                      Date: Fri, 08 Nov 2024 19:30:43 GMT
                                                      Server: Apache/2.4.37 (centos)
                                                      Last-Modified: Fri, 08 Nov 2024 12:22:25 GMT
                                                      ETag: "1079-62665cdb4e240"
                                                      Accept-Ranges: bytes
                                                      Content-Length: 4217
                                                      Keep-Alive: timeout=5, max=100
                                                      Connection: Keep-Alive
                                                      Data Raw: ef bb bf 5b 53 65 63 74 69 6f 6e 5d 0a 4e 61 6d 65 3d 50 6c 75 67 4d 61 6e 0a 44 65 73 63 72 69 70 74 69 6f 6e 3d 22 d0 9c d0 b5 d0 bd d0 b5 d0 b4 d0 b6 d0 b5 d1 80 20 d0 bf d0 bb d0 b0 d0 b3 d0 b8 d0 bd d0 be d0 b2 22 0a 44 61 74 65 3d 30 34 2e 31 30 2e 32 30 32 33 20 31 32 3a 30 30 0a 56 65 72 73 69 6f 6e 3d 2a 0a 5b 46 69 6c 65 5d 0a 55 52 4c 3d 50 6c 75 67 6d 61 6e 2f 50 6c 75 67 4d 61 6e 2e 65 78 65 0a 4e 61 6d 65 3d 50 6c 75 67 4d 61 6e 2e 65 78 65 0a 50 61 74 68 3d 2a 0a 0a 5b 53 65 63 74 69 6f 6e 5d 0a 4e 61 6d 65 3d 42 69 6d 53 74 65 70 5f d0 90 d0 a0 0a 44 65 73 63 72 69 70 74 69 6f 6e 3d 22 d0 90 d1 80 d1 85 d0 b8 d1 82 d0 b5 d0 ba d1 82 d1 83 d1 80 d0 bd d1 8b d0 b5 20 d1 80 d0 b5 d1 88 d0 b5 d0 bd d0 b8 d1 8f 22 0a 44 61 74 65 3d 32 39 2e 31 30 2e 32 30 32 34 20 31 34 3a 30 30 0a 56 65 72 73 69 6f 6e 3d 32 30 31 39 2c 32 30 32 30 2c 32 30 32 31 2c 32 30 32 32 2c 32 30 32 33 2c 32 30 32 34 2c 32 30 32 35 0a 48 69 73 74 6f 72 79 55 52 4c 3d 42 69 6d 53 74 65 70 5f d0 90 d0 a0 2e 74 78 74 [TRUNCATED]
                                                      Data Ascii: [Section]Name=PlugManDescription=" "Date=04.10.2023 12:00Version=*[File]URL=Plugman/PlugMan.exeName=PlugMan.exePath=*[Section]Name=BimStep_Description=" "Date=29.10.2024 14:00Version=2019,2020,2021,2022,2023,2024,2025HistoryURL=BimStep_.txt[File]URL=%Version%/BimStep_/BimStep_.addinName=BimStep_.addinPath=%AppData%\Autodesk\Revit\Addins\%Version%[File]URL=%Version%/BimStep_/BimStep_.dllName=BimStep_.dllPath=%AppData%\Autodesk\Revit\Addins\%Version%[Section]Name=BimStep_Description=" "Date=01.10.2024 13:00Version=2019,2020,2021,2022,2023,2024,2025HistoryURL=BimStep_.txt[File]URL=%Version%/BimStep_/BimStep_.addinName=BimStep_.addinPath=%AppData%\Autodesk\Revit\Addins\%Version%[File]URL=%Version%/BimStep_/BimStep_.dllName=Bim
                                                      Nov 8, 2024 20:30:43.695815086 CET1236INData Raw: 53 74 65 70 5f d0 98 d0 bd d0 b6 2e 64 6c 6c 0a 50 61 74 68 3d 25 41 70 70 44 61 74 61 25 5c 41 75 74 6f 64 65 73 6b 5c 52 65 76 69 74 5c 41 64 64 69 6e 73 5c 25 56 65 72 73 69 6f 6e 25 0a 0a 5b 53 65 63 74 69 6f 6e 5d 0a 4e 61 6d 65 3d 42 69 6d
                                                      Data Ascii: Step_.dllPath=%AppData%\Autodesk\Revit\Addins\%Version%[Section]Name=BimStep_Description=" "Date=08.10.2024 12:00Version=2019,2020,2021,2022,2023,2024,2025HistoryURL=BimStep_.txt[File]
                                                      Nov 8, 2024 20:30:43.695827007 CET424INData Raw: 6e 25 2f 42 69 6d 53 74 65 70 5f d0 9a d0 a0 2f 42 69 6d 53 74 65 70 5f d0 9a d0 a0 2e 64 6c 6c 0a 4e 61 6d 65 3d 42 69 6d 53 74 65 70 5f d0 9a d0 a0 2e 64 6c 6c 0a 50 61 74 68 3d 25 41 70 70 44 61 74 61 25 5c 41 75 74 6f 64 65 73 6b 5c 52 65 76
                                                      Data Ascii: n%/BimStep_/BimStep_.dllName=BimStep_.dllPath=%AppData%\Autodesk\Revit\Addins\%Version%[Section]Name=BimStep_Description=""Date=10.09.2024 12:00Version=2019,2020,2021,2022,2023,2024,2025HistoryURL=B
                                                      Nov 8, 2024 20:30:43.695842981 CET1236INData Raw: d0 b2 2f 42 69 6d 53 74 65 70 5f d0 9e d1 82 d0 b2 2e 64 6c 6c 0a 4e 61 6d 65 3d 42 69 6d 53 74 65 70 5f d0 9e d1 82 d0 b2 2e 64 6c 6c 0a 50 61 74 68 3d 25 41 70 70 44 61 74 61 25 5c 41 75 74 6f 64 65 73 6b 5c 52 65 76 69 74 5c 41 64 64 69 6e 73
                                                      Data Ascii: /BimStep_.dllName=BimStep_.dllPath=%AppData%\Autodesk\Revit\Addins\%Version%[Section]Name=BimStep_AdminDescription=""Date=26.10.2022 14:00Version=2019,2020,2021,2022,2023,2024HistoryURL=BimStep_Admin.txt[File]
                                                      Nov 8, 2024 20:30:43.695857048 CET347INData Raw: 61 74 61 25 5c 41 75 74 6f 64 65 73 6b 5c 52 65 76 69 74 5c 41 64 64 69 6e 73 5c 25 56 65 72 73 69 6f 6e 25 0a 0a 5b 53 65 63 74 69 6f 6e 5d 0a 4e 61 6d 65 3d 42 69 6d 53 74 65 70 43 6c 61 73 68 0a 44 65 73 63 72 69 70 74 69 6f 6e 3d 22 42 69 6d
                                                      Data Ascii: ata%\Autodesk\Revit\Addins\%Version%[Section]Name=BimStepClashDescription="BimStepClash"Date=02.08.2024 12:00Version=2019,2020,2021,2022,2023,2024,2025HistoryURL=BimStepClash.txt[File]URL=%Version%/BimStepClash/BimStepClash.dllName=B


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Target ID:0
                                                      Start time:14:30:39
                                                      Start date:08/11/2024
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exe"
                                                      Imagebase:0xb20000
                                                      File size:278'528 bytes
                                                      MD5 hash:D259C61B387FCD39B3AB83DD9EE1FC26
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:14.7%
                                                        Dynamic/Decrypted Code Coverage:99.4%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:663
                                                        Total number of Limit Nodes:26
                                                        execution_graph 43984 7703fb0 43985 7703fbd 43984->43985 43990 7703fe0 43985->43990 43995 7704008 43985->43995 44001 7703fd0 43985->44001 43986 7703fcc 43991 7703ff0 43990->43991 44006 77011d0 SendMessageW 43991->44006 44008 77011c8 43991->44008 43992 7704001 43992->43986 43996 7703ff9 43995->43996 43998 7704012 43995->43998 43999 77011d0 SendMessageW 43996->43999 44000 77011c8 SendMessageW 43996->44000 43997 7704001 43997->43986 43998->43986 43999->43997 44000->43997 44002 7703fe0 44001->44002 44004 77011d0 SendMessageW 44002->44004 44005 77011c8 SendMessageW 44002->44005 44003 7704001 44003->43986 44004->44003 44005->44003 44007 770123c 44006->44007 44007->43992 44009 77011d0 SendMessageW 44008->44009 44010 770123c 44009->44010 44010->43992 44011 540b6c0 44012 540b6d0 44011->44012 44015 5409990 44012->44015 44014 540b6df 44016 540999b 44015->44016 44017 540b712 44016->44017 44019 15e819c 44016->44019 44017->44014 44021 15e81a7 44019->44021 44020 15e9ff1 44020->44017 44021->44020 44023 15ee7b0 44021->44023 44024 15ee7d1 44023->44024 44025 15ee7f5 44024->44025 44027 15ee960 44024->44027 44025->44020 44028 15ee96d 44027->44028 44030 15ee9a7 44028->44030 44031 15ee2b8 44028->44031 44030->44025 44032 15ee2c3 44031->44032 44034 15ef2b8 44032->44034 44035 15ee3e4 44032->44035 44036 15ee3ef 44035->44036 44037 15e819c CreateWindowExW 44036->44037 44038 15ef727 44037->44038 44042 5401158 44038->44042 44048 5401170 44038->44048 44039 15ef761 44039->44034 44043 54011a1 44042->44043 44045 54012a1 44042->44045 44044 54011ad 44043->44044 44054 54023c0 44043->44054 44059 54023d0 44043->44059 44044->44039 44045->44039 44050 54012a1 44048->44050 44051 54011a1 44048->44051 44049 54011ad 44049->44039 44050->44039 44051->44049 44052 54023c0 CreateWindowExW 44051->44052 44053 54023d0 CreateWindowExW 44051->44053 44052->44050 44053->44050 44055 54023fb 44054->44055 44056 54024aa 44055->44056 44064 54032a0 44055->44064 44067 5403271 44055->44067 44056->44056 44060 54023fb 44059->44060 44061 54024aa 44060->44061 44062 54032a0 CreateWindowExW 44060->44062 44063 5403271 CreateWindowExW 44060->44063 44062->44061 44063->44061 44071 5401660 44064->44071 44068 54032a0 44067->44068 44069 5401660 CreateWindowExW 44068->44069 44070 54032d5 44069->44070 44070->44056 44072 54032f0 CreateWindowExW 44071->44072 44074 5403414 44072->44074 44493 5400920 44496 540093c 44493->44496 44494 540098c 44495 5400991 44496->44495 44497 5400a30 2 API calls 44496->44497 44498 5400a1f 2 API calls 44496->44498 44497->44494 44498->44494 44075 931f9b0 44076 931f9f2 44075->44076 44077 931f9f8 SetWindowTextW 44075->44077 44076->44077 44078 931fa29 44077->44078 44499 15eea78 44500 15eeabe 44499->44500 44503 15eec58 44500->44503 44506 15ee380 44503->44506 44507 15eecc0 DuplicateHandle 44506->44507 44508 15eebab 44507->44508 44079 7706c38 44080 7706c5b 44079->44080 44083 931f610 44080->44083 44081 7706c64 44084 931f622 44083->44084 44085 931f61b 44083->44085 44088 931f631 44084->44088 44085->44081 44086 931f628 44086->44081 44089 931f64e 44088->44089 44091 931f670 44088->44091 44090 931f65c 44089->44090 44094 5404c68 44089->44094 44099 5404c78 44089->44099 44090->44086 44091->44086 44096 5404c78 44094->44096 44095 5404d15 44095->44090 44096->44095 44104 931f6a1 44096->44104 44109 931f6b0 44096->44109 44101 5404cc4 44099->44101 44100 5404d15 44100->44090 44101->44100 44102 931f6a1 7 API calls 44101->44102 44103 931f6b0 7 API calls 44101->44103 44102->44100 44103->44100 44105 931f6b0 44104->44105 44106 931f719 44105->44106 44114 5405882 44105->44114 44121 54017b4 44105->44121 44106->44095 44110 931f6f6 44109->44110 44111 931f719 44110->44111 44112 5405882 7 API calls 44110->44112 44113 54017b4 7 API calls 44110->44113 44111->44095 44112->44111 44113->44111 44115 54058aa 44114->44115 44116 54058f2 44115->44116 44117 540599c 44115->44117 44118 540594a CallWindowProcW 44116->44118 44120 54058f9 44116->44120 44128 540168c 44117->44128 44118->44120 44120->44106 44122 54017bf 44121->44122 44123 54058f2 44122->44123 44124 540599c 44122->44124 44125 540594a CallWindowProcW 44123->44125 44127 54058f9 44123->44127 44126 540168c 6 API calls 44124->44126 44125->44127 44126->44127 44127->44106 44131 5401697 44128->44131 44129 5404269 44130 54017b4 7 API calls 44129->44130 44133 5404267 44129->44133 44130->44133 44131->44129 44132 5404259 44131->44132 44132->44133 44139 5404380 44132->44139 44144 540445c 44132->44144 44150 931daa0 44132->44150 44156 931dab0 44132->44156 44162 5404390 44132->44162 44141 5404390 44139->44141 44140 5404430 44140->44133 44167 5404448 44141->44167 44175 5404438 44141->44175 44145 540441a 44144->44145 44146 540446a 44144->44146 44148 5404448 7 API calls 44145->44148 44149 5404438 7 API calls 44145->44149 44147 5404430 44147->44133 44148->44147 44149->44147 44151 931dab0 44150->44151 44152 931dac5 44151->44152 44154 5405882 7 API calls 44151->44154 44155 54017b4 7 API calls 44151->44155 44152->44133 44153 931daf0 44153->44133 44154->44153 44155->44153 44157 931dabd 44156->44157 44158 931dac5 44157->44158 44160 5405882 7 API calls 44157->44160 44161 54017b4 7 API calls 44157->44161 44158->44133 44159 931daf0 44159->44133 44160->44159 44161->44159 44163 54043a4 44162->44163 44165 5404448 7 API calls 44163->44165 44166 5404438 7 API calls 44163->44166 44164 5404430 44164->44133 44165->44164 44166->44164 44172 5404459 44167->44172 44184 931f070 44167->44184 44195 77022a8 44167->44195 44201 7703068 44167->44201 44206 931f05f 44167->44206 44224 7702298 44167->44224 44229 7703058 44167->44229 44172->44140 44176 5404448 44175->44176 44177 931f070 7 API calls 44176->44177 44178 7703058 7 API calls 44176->44178 44179 7702298 7 API calls 44176->44179 44180 931f05f 7 API calls 44176->44180 44181 7703068 7 API calls 44176->44181 44182 77022a8 7 API calls 44176->44182 44183 5404459 44176->44183 44177->44183 44178->44183 44179->44183 44180->44183 44181->44183 44182->44183 44183->44140 44185 931f089 44184->44185 44192 931f09c 44184->44192 44186 931f0d0 44185->44186 44187 931f08e 44185->44187 44189 931f35c 44186->44189 44186->44192 44188 931f2ba 44187->44188 44187->44192 44234 931e718 44188->44234 44238 931e7c8 44189->44238 44193 931f1d6 44192->44193 44194 931f610 7 API calls 44192->44194 44193->44172 44194->44193 44196 7702329 44195->44196 44198 77022ca 44195->44198 44197 7702330 44196->44197 44199 5404c68 7 API calls 44196->44199 44200 5404c78 7 API calls 44196->44200 44197->44172 44198->44172 44199->44197 44200->44197 44202 770309a 44201->44202 44203 77031a3 44202->44203 44204 5404c68 7 API calls 44202->44204 44205 5404c78 7 API calls 44202->44205 44203->44172 44204->44203 44205->44203 44207 931f062 44206->44207 44210 931f00c 44206->44210 44208 931f0d0 44207->44208 44209 931f08e 44207->44209 44216 931f09c 44207->44216 44213 931f35c 44208->44213 44208->44216 44211 931f2ba 44209->44211 44209->44216 44242 5400a30 44210->44242 44249 5400a1f 44210->44249 44214 931e718 7 API calls 44211->44214 44212 931f038 44256 9313210 44212->44256 44261 9313220 44212->44261 44215 931e7c8 7 API calls 44213->44215 44218 931f1d6 44214->44218 44215->44218 44216->44218 44219 931f610 7 API calls 44216->44219 44217 931f04c 44218->44172 44219->44218 44225 77022a8 44224->44225 44226 77022ca 44225->44226 44227 5404c68 7 API calls 44225->44227 44228 5404c78 7 API calls 44225->44228 44226->44172 44227->44226 44228->44226 44230 7703068 44229->44230 44231 77031a3 44230->44231 44232 5404c68 7 API calls 44230->44232 44233 5404c78 7 API calls 44230->44233 44231->44172 44232->44231 44233->44231 44235 931e723 44234->44235 44236 931f610 7 API calls 44235->44236 44237 931f826 44236->44237 44237->44193 44239 931e7d3 44238->44239 44240 931f610 7 API calls 44239->44240 44241 931fe79 44240->44241 44241->44193 44243 5400a55 44242->44243 44244 5400a4f 44242->44244 44243->44212 44244->44243 44245 5400b88 KiUserCallbackDispatcher 44244->44245 44247 77018c0 SetWindowLongW 44244->44247 44248 77018b1 SetWindowLongW 44244->44248 44245->44243 44247->44245 44248->44245 44251 5400a30 44249->44251 44250 5400a55 44250->44212 44251->44250 44252 5400b88 KiUserCallbackDispatcher 44251->44252 44254 77018c0 SetWindowLongW 44251->44254 44255 77018b1 SetWindowLongW 44251->44255 44252->44250 44254->44252 44255->44252 44257 9313220 44256->44257 44259 9313248 KiUserCallbackDispatcher 44257->44259 44260 931323a KiUserCallbackDispatcher 44257->44260 44258 9313234 44258->44217 44259->44258 44260->44258 44262 931322d 44261->44262 44264 9313248 KiUserCallbackDispatcher 44262->44264 44265 931323a KiUserCallbackDispatcher 44262->44265 44263 9313234 44263->44217 44264->44263 44265->44263 44509 7702898 44510 77028bf 44509->44510 44511 7702920 44510->44511 44514 5400f67 44510->44514 44519 5400f78 44510->44519 44515 5400f78 44514->44515 44516 5400f9f 44515->44516 44523 5400fe8 44515->44523 44532 5400ff8 44515->44532 44516->44511 44520 5400f9f 44519->44520 44521 5400fe8 CreateWindowExW 44519->44521 44522 5400ff8 CreateWindowExW 44519->44522 44520->44511 44521->44520 44522->44520 44524 540102b 44523->44524 44525 5401072 44524->44525 44526 5401170 CreateWindowExW 44524->44526 44529 5401158 CreateWindowExW 44524->44529 44541 7702b80 44524->44541 44546 7702b70 44524->44546 44551 77062c8 44524->44551 44556 77062d8 44524->44556 44525->44516 44526->44525 44529->44525 44534 540102b 44532->44534 44533 5401072 44533->44516 44534->44533 44535 5401170 CreateWindowExW 44534->44535 44536 7702b70 CreateWindowExW 44534->44536 44537 7702b80 CreateWindowExW 44534->44537 44538 5401158 CreateWindowExW 44534->44538 44539 77062d8 CreateWindowExW 44534->44539 44540 77062c8 CreateWindowExW 44534->44540 44535->44533 44536->44533 44537->44533 44538->44533 44539->44533 44540->44533 44542 7702ba5 44541->44542 44544 5401170 CreateWindowExW 44542->44544 44545 5401158 CreateWindowExW 44542->44545 44543 7702c1b 44543->44543 44544->44543 44545->44543 44548 7702ba5 44546->44548 44547 7702c1b 44549 5401170 CreateWindowExW 44548->44549 44550 5401158 CreateWindowExW 44548->44550 44549->44547 44550->44547 44552 77062d8 44551->44552 44554 5401170 CreateWindowExW 44552->44554 44555 5401158 CreateWindowExW 44552->44555 44553 7706305 44554->44553 44555->44553 44558 5401170 CreateWindowExW 44556->44558 44559 5401158 CreateWindowExW 44556->44559 44557 7706305 44558->44557 44559->44557 44266 77076fb 44267 770770e 44266->44267 44271 77079e0 44267->44271 44275 77079b0 44267->44275 44268 7707731 44272 77079e3 PostMessageW 44271->44272 44274 7707a4c 44272->44274 44274->44268 44276 77079dc PostMessageW 44275->44276 44278 7707a4c 44276->44278 44278->44268 44560 15ec6f0 44563 15ec7d8 44560->44563 44561 15ec6ff 44564 15ec81c 44563->44564 44565 15ec7f9 44563->44565 44564->44561 44565->44564 44566 15eca20 GetModuleHandleW 44565->44566 44567 15eca4d 44566->44567 44567->44561 44279 54099d0 44280 54099fd 44279->44280 44285 5409598 44280->44285 44284 5409ac3 44286 54095a3 44285->44286 44293 540985c 44286->44293 44288 5409a91 44289 54095a8 44288->44289 44290 54095b3 44289->44290 44291 5409990 CreateWindowExW 44290->44291 44292 540b6df 44291->44292 44292->44284 44294 5409867 44293->44294 44296 15e819c CreateWindowExW 44294->44296 44295 540b05c 44295->44288 44296->44295 44297 77021e0 44298 7702225 GetClassInfoW 44297->44298 44300 770226b 44298->44300 44568 7707ec0 44569 77081c8 44568->44569 44570 7707ee8 44568->44570 44571 7707ef1 44570->44571 44574 7707b00 44570->44574 44573 7707f14 44575 7707b0b 44574->44575 44576 770820b 44575->44576 44578 7707b10 44575->44578 44576->44573 44579 7708240 OleInitialize 44578->44579 44581 77082a4 44579->44581 44581->44576 44582 7700d40 44584 7700d61 44582->44584 44583 7700dc0 44584->44583 44587 7700e20 44584->44587 44592 7700e11 44584->44592 44588 7700e33 44587->44588 44589 7700e83 44588->44589 44590 54023c0 CreateWindowExW 44588->44590 44591 54023d0 CreateWindowExW 44588->44591 44589->44583 44590->44589 44591->44589 44593 7700e20 44592->44593 44594 7700e83 44593->44594 44595 54023c0 CreateWindowExW 44593->44595 44596 54023d0 CreateWindowExW 44593->44596 44594->44583 44595->44594 44596->44594 44597 77091c0 DispatchMessageW 44598 770922c 44597->44598 44599 54036b0 44601 54036b6 44599->44601 44600 5403876 44601->44600 44603 5403508 44601->44603 44606 540169c 44603->44606 44607 5403538 SetWindowLongW 44606->44607 44608 5403520 44607->44608 44608->44600 44301 931fda0 44303 931fdba 44301->44303 44302 931fe44 44304 931f6a1 7 API calls 44303->44304 44305 931f6b0 7 API calls 44303->44305 44304->44302 44305->44302 44306 931d820 44310 931d838 44306->44310 44314 931d848 44306->44314 44313 931d848 44310->44313 44311 931d901 44311->44311 44313->44311 44318 931b128 44313->44318 44317 931d876 44314->44317 44315 931d901 44315->44315 44316 931b128 2 API calls 44316->44315 44317->44315 44317->44316 44319 931b133 44318->44319 44323 931da08 44319->44323 44324 931b148 44319->44324 44323->44311 44326 931b153 44324->44326 44325 931d9cf 44325->44323 44329 931b158 44325->44329 44326->44325 44327 54023c0 CreateWindowExW 44326->44327 44328 54023d0 CreateWindowExW 44326->44328 44327->44325 44328->44325 44330 931db30 SetTimer 44329->44330 44331 931db9c 44330->44331 44331->44323 44609 15e4668 44610 15e4684 44609->44610 44612 15e4761 44610->44612 44618 15e54c9 44610->44618 44614 15e47b3 44627 931dfd0 44614->44627 44631 931dfc0 44614->44631 44619 15e54ed 44618->44619 44635 15e59e0 44619->44635 44639 15e59d1 44619->44639 44620 15e4794 44623 15e3e28 44620->44623 44624 15e3e33 44623->44624 44647 15e8088 44624->44647 44626 15e85b7 44626->44614 44628 931dfe2 44627->44628 44659 931b184 44628->44659 44632 931dfe2 44631->44632 44633 931b184 13 API calls 44632->44633 44634 931e002 44633->44634 44634->44612 44637 15e5a07 44635->44637 44636 15e5ae4 44636->44636 44637->44636 44643 15e4648 44637->44643 44641 15e59e0 44639->44641 44640 15e5ae4 44640->44640 44641->44640 44642 15e4648 CreateActCtxA 44641->44642 44642->44640 44644 15e6a70 CreateActCtxA 44643->44644 44646 15e6b33 44644->44646 44648 15e8093 44647->44648 44651 15e813c 44648->44651 44650 15e8b6d 44650->44626 44652 15e8147 44651->44652 44655 15e816c 44652->44655 44654 15e8c42 44654->44650 44656 15e8177 44655->44656 44657 15e819c CreateWindowExW 44656->44657 44658 15e8d45 44657->44658 44658->44654 44661 931b18f 44659->44661 44663 931dc30 44661->44663 44662 931e114 44662->44662 44667 931dc3b 44663->44667 44664 931e226 44665 931de4c 13 API calls 44664->44665 44666 931e380 44664->44666 44665->44666 44666->44662 44667->44664 44667->44666 44669 931de4c 44667->44669 44670 931de57 44669->44670 44674 931e9d8 44670->44674 44678 931e9c8 44670->44678 44671 931e5bc 44671->44664 44675 931e9fe 44674->44675 44676 931ea12 44675->44676 44682 15ef7a0 44675->44682 44676->44671 44680 931e9d8 44678->44680 44679 931ea12 44679->44671 44680->44679 44681 15ef7a0 13 API calls 44680->44681 44681->44679 44683 15ef7ce 44682->44683 44686 15efaaa 44683->44686 44687 15ef89f 44683->44687 44690 5405b90 12 API calls 44683->44690 44684 15ef846 44685 15ef89a KiUserCallbackDispatcher 44684->44685 44685->44687 44687->44686 44691 7701e30 44687->44691 44695 7701e2a 44687->44695 44690->44684 44692 7701e5a 44691->44692 44699 77020f0 44692->44699 44693 7701e7d 44693->44686 44696 7701e30 44695->44696 44698 77020f0 CreateWindowExW 44696->44698 44697 7701e7d 44697->44686 44698->44697 44700 7702114 44699->44700 44706 540051b 44700->44706 44714 5400006 44700->44714 44722 5400520 44700->44722 44730 540050f 44700->44730 44701 7702144 44701->44693 44707 5400520 44706->44707 44709 5400581 44707->44709 44710 5400f67 CreateWindowExW 44707->44710 44711 5400f78 CreateWindowExW 44707->44711 44708 5400662 44708->44701 44709->44708 44738 7702160 44709->44738 44749 7702151 44709->44749 44710->44709 44711->44709 44715 540056c 44714->44715 44717 5400581 44715->44717 44718 5400f67 CreateWindowExW 44715->44718 44719 5400f78 CreateWindowExW 44715->44719 44716 5400662 44716->44701 44717->44716 44720 7702160 CreateWindowExW 44717->44720 44721 7702151 CreateWindowExW 44717->44721 44718->44717 44719->44717 44720->44717 44721->44717 44723 540053d 44722->44723 44724 5400581 44723->44724 44726 5400f67 CreateWindowExW 44723->44726 44727 5400f78 CreateWindowExW 44723->44727 44725 5400662 44724->44725 44728 7702160 CreateWindowExW 44724->44728 44729 7702151 CreateWindowExW 44724->44729 44725->44701 44726->44724 44727->44724 44728->44724 44729->44724 44732 5400551 44730->44732 44731 5400581 44733 5400662 44731->44733 44736 7702160 CreateWindowExW 44731->44736 44737 7702151 CreateWindowExW 44731->44737 44732->44731 44734 5400f67 CreateWindowExW 44732->44734 44735 5400f78 CreateWindowExW 44732->44735 44733->44701 44734->44731 44735->44731 44736->44731 44737->44731 44739 7702174 44738->44739 44740 770216c 44738->44740 44739->44709 44741 5400520 CreateWindowExW 44740->44741 44742 9312110 CreateWindowExW 44740->44742 44743 9312eb0 CreateWindowExW 44740->44743 44744 9312ec0 CreateWindowExW 44740->44744 44745 9312102 CreateWindowExW 44740->44745 44746 5400006 CreateWindowExW 44740->44746 44747 540051b CreateWindowExW 44740->44747 44748 540050f CreateWindowExW 44740->44748 44741->44739 44742->44739 44743->44739 44744->44739 44745->44739 44746->44739 44747->44739 44748->44739 44750 7702160 44749->44750 44751 7702174 44750->44751 44752 5400520 CreateWindowExW 44750->44752 44753 9312110 CreateWindowExW 44750->44753 44754 9312eb0 CreateWindowExW 44750->44754 44755 9312ec0 CreateWindowExW 44750->44755 44756 9312102 CreateWindowExW 44750->44756 44757 5400006 CreateWindowExW 44750->44757 44758 540051b CreateWindowExW 44750->44758 44759 540050f CreateWindowExW 44750->44759 44751->44709 44752->44751 44753->44751 44754->44751 44755->44751 44756->44751 44757->44751 44758->44751 44759->44751 44332 5405a18 44333 5405a28 44332->44333 44340 7703c60 44333->44340 44348 7703c70 44333->44348 44355 931f8ef 44333->44355 44359 540730c 44333->44359 44365 931f900 44333->44365 44334 5405a51 44341 7703c70 44340->44341 44369 5407050 44341->44369 44381 5407060 44341->44381 44342 7703de1 44343 7703c94 44343->44342 44393 7704050 SendMessageW 44343->44393 44395 7704049 44343->44395 44353 5407050 12 API calls 44348->44353 44354 5407060 12 API calls 44348->44354 44349 7703c94 44350 7703de1 44349->44350 44351 7704050 SendMessageW 44349->44351 44352 7704049 SendMessageW 44349->44352 44351->44350 44352->44350 44353->44349 44354->44349 44356 931f935 44355->44356 44358 540730c 12 API calls 44356->44358 44357 931f98a 44357->44334 44358->44357 44360 5407315 44359->44360 44362 5407333 44359->44362 44361 5405b90 12 API calls 44360->44361 44360->44362 44361->44362 44363 5405b90 12 API calls 44362->44363 44364 540746c 44362->44364 44363->44364 44364->44334 44366 931f935 44365->44366 44368 540730c 12 API calls 44366->44368 44367 931f98a 44367->44334 44368->44367 44372 5407060 44369->44372 44371 5405b90 12 API calls 44373 540746c 44371->44373 44380 54072c4 44372->44380 44398 5406cf4 12 API calls 44372->44398 44373->44343 44374 5407145 44379 54071ed 44374->44379 44399 5405b90 44374->44399 44376 54071b7 44377 5405b90 12 API calls 44376->44377 44377->44379 44378 5405b90 12 API calls 44378->44380 44379->44378 44380->44371 44380->44373 44385 540708c 44381->44385 44383 5405b90 12 API calls 44384 540746c 44383->44384 44384->44343 44392 54072c4 44385->44392 44492 5406cf4 12 API calls 44385->44492 44386 5407145 44387 5405b90 12 API calls 44386->44387 44391 54071ed 44386->44391 44388 54071b7 44387->44388 44389 5405b90 12 API calls 44388->44389 44389->44391 44390 5405b90 12 API calls 44390->44392 44391->44390 44392->44383 44392->44384 44394 77040bc 44393->44394 44394->44342 44396 7704050 SendMessageW 44395->44396 44397 77040bc 44396->44397 44397->44342 44398->44374 44400 5405ba0 44399->44400 44401 5405bdd 44400->44401 44404 931f05f 7 API calls 44400->44404 44405 931ed78 44400->44405 44426 931ed68 44400->44426 44401->44376 44404->44401 44406 931edb1 44405->44406 44408 931ee4f 44406->44408 44420 5401170 CreateWindowExW 44406->44420 44421 5401158 CreateWindowExW 44406->44421 44407 931eec5 44471 931323a 44407->44471 44475 9313248 44407->44475 44447 9313300 44408->44447 44455 93133d9 44408->44455 44463 93132f0 44408->44463 44409 931efe5 44424 5400a30 2 API calls 44409->44424 44425 5400a1f 2 API calls 44409->44425 44410 931eecd 44410->44409 44416 931b158 SetTimer 44410->44416 44479 931db29 44410->44479 44411 931f038 44413 9313220 2 API calls 44411->44413 44414 9313210 2 API calls 44411->44414 44412 931f04c 44413->44412 44414->44412 44416->44409 44420->44408 44421->44408 44424->44411 44425->44411 44427 931ed78 44426->44427 44429 931ee4f 44427->44429 44443 5401170 CreateWindowExW 44427->44443 44444 5401158 CreateWindowExW 44427->44444 44428 931eec5 44445 9313248 KiUserCallbackDispatcher 44428->44445 44446 931323a KiUserCallbackDispatcher 44428->44446 44440 9313300 2 API calls 44429->44440 44441 93132f0 2 API calls 44429->44441 44442 93133d9 2 API calls 44429->44442 44430 931eecd 44431 931efe5 44430->44431 44438 931db29 SetTimer 44430->44438 44439 931b158 SetTimer 44430->44439 44434 5400a30 2 API calls 44431->44434 44435 5400a1f 2 API calls 44431->44435 44432 931f038 44436 9313220 2 API calls 44432->44436 44437 9313210 2 API calls 44432->44437 44433 931f04c 44434->44432 44435->44432 44436->44433 44437->44433 44438->44431 44439->44431 44440->44428 44441->44428 44442->44428 44443->44429 44444->44429 44445->44430 44446->44430 44448 9313329 44447->44448 44449 9313402 44448->44449 44450 931341c 44448->44450 44482 7701198 44448->44482 44487 7701188 44448->44487 44451 7701198 2 API calls 44449->44451 44452 7701188 2 API calls 44449->44452 44450->44407 44451->44450 44452->44450 44456 93133de 44455->44456 44457 9313402 44456->44457 44459 7701198 2 API calls 44456->44459 44460 7701188 2 API calls 44456->44460 44461 7701198 2 API calls 44457->44461 44462 7701188 2 API calls 44457->44462 44458 931341c 44458->44407 44459->44457 44460->44457 44461->44458 44462->44458 44466 9313300 44463->44466 44464 931341c 44464->44407 44465 9313402 44467 7701198 2 API calls 44465->44467 44468 7701188 2 API calls 44465->44468 44466->44464 44466->44465 44469 7701198 2 API calls 44466->44469 44470 7701188 2 API calls 44466->44470 44467->44464 44468->44464 44469->44465 44470->44465 44472 931326b 44471->44472 44473 9313242 44471->44473 44472->44410 44473->44472 44474 9313264 KiUserCallbackDispatcher 44473->44474 44474->44472 44476 9313259 44475->44476 44477 931326b 44476->44477 44478 9313264 KiUserCallbackDispatcher 44476->44478 44477->44410 44478->44477 44480 931db30 SetTimer 44479->44480 44481 931db9c 44480->44481 44481->44409 44483 77011a8 44482->44483 44485 77011d0 SendMessageW 44483->44485 44486 77011c8 SendMessageW 44483->44486 44484 77011b9 44484->44449 44485->44484 44486->44484 44488 7701198 44487->44488 44490 77011d0 SendMessageW 44488->44490 44491 77011c8 SendMessageW 44488->44491 44489 77011b9 44489->44449 44490->44489 44491->44489 44492->44386 44760 124d01c 44761 124d034 44760->44761 44762 124d08e 44761->44762 44766 540168c 7 API calls 44761->44766 44767 54041f8 44761->44767 44779 5403499 44761->44779 44783 54034a8 44761->44783 44766->44762 44768 5404197 44767->44768 44769 5404206 44767->44769 44768->44762 44770 5404269 44769->44770 44772 5404259 44769->44772 44771 54017b4 7 API calls 44770->44771 44773 5404267 44770->44773 44771->44773 44772->44773 44774 5404380 7 API calls 44772->44774 44775 5404390 7 API calls 44772->44775 44776 931dab0 7 API calls 44772->44776 44777 931daa0 7 API calls 44772->44777 44778 540445c 7 API calls 44772->44778 44774->44773 44775->44773 44776->44773 44777->44773 44778->44773 44780 54034a8 44779->44780 44781 540168c 7 API calls 44780->44781 44782 54034ef 44781->44782 44782->44762 44784 54034ce 44783->44784 44785 540168c 7 API calls 44784->44785 44786 54034ef 44785->44786 44786->44762

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 392 77084d1-77084df 393 77084e1-7708508 392->393 394 770851c-7708548 392->394 403 7708511-770851a 393->403 404 770850a-770850c 393->404 397 7708979 394->397 398 770854e-7708562 394->398 402 770897e-7708994 397->402 400 7708591-77085b0 398->400 401 7708564-770858e 398->401 411 77085b2-77085b8 400->411 412 77085c8-77085ca 400->412 401->400 407 77089ca-77089df 402->407 403->394 404->407 416 77085ba 411->416 417 77085bc-77085be 411->417 413 77085e9-77085f2 412->413 414 77085cc-77085e4 412->414 418 77085fa-7708601 413->418 414->402 416->412 417->412 419 7708603-7708609 418->419 420 770860b-7708612 418->420 421 770861f-770863c call 7707b70 419->421 422 7708614-770861a 420->422 423 770861c 420->423 426 7708791-7708795 421->426 427 7708642-7708649 421->427 422->421 423->421 428 7708964-7708977 426->428 429 770879b-770879f 426->429 427->397 430 770864f-770868c 427->430 428->402 431 77087a1-77087b4 429->431 432 77087b9-77087c2 429->432 438 7708692-7708697 430->438 439 770895a-770895e 430->439 431->402 433 77087f1-77087f8 432->433 434 77087c4-77087ee 432->434 436 7708897-77088ac 433->436 437 77087fe-7708805 433->437 434->433 436->439 453 77088b2-77088b4 436->453 443 7708834-7708856 437->443 444 7708807-7708831 437->444 440 77086c9-77086de call 7707b94 438->440 441 7708699-77086a7 call 7707b7c 438->441 439->418 439->428 451 77086e3-77086e7 440->451 441->440 454 77086a9-77086c7 call 7707b88 441->454 443->436 477 7708858-7708862 443->477 444->443 455 7708758-7708765 451->455 456 77086e9-77086fb call 7707ba0 451->456 457 7708901-770891e call 7707b70 453->457 458 77088b6-77088ef 453->458 454->451 455->439 471 770876b-7708775 call 7707bb0 455->471 482 770873b-7708753 456->482 483 77086fd-770872d 456->483 457->439 470 7708920-770894c 457->470 474 77088f1-77088f7 458->474 475 77088f8-77088ff 458->475 484 7708953 470->484 485 770894e 470->485 486 7708784-770878c call 7707bc8 471->486 487 7708777-770877a call 7707bbc 471->487 474->475 475->439 492 7708864-770886a 477->492 493 770887a-7708895 477->493 482->402 497 7708734 483->497 498 770872f 483->498 484->439 485->484 486->439 499 770877f 487->499 495 770886c 492->495 496 770886e-7708870 492->496 493->436 493->477 495->493 496->493 497->482 498->497 499->439
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (t2$(t2$(t2$(t2
                                                        • API String ID: 0-3677074101
                                                        • Opcode ID: b1d1c056de12bec1fc2d2803937cd77d9e8eac9f07565d84069087c84ea6d28d
                                                        • Instruction ID: b75b8226fe867a371d737a6d598d796207323028277d390e52724ace88026581
                                                        • Opcode Fuzzy Hash: b1d1c056de12bec1fc2d2803937cd77d9e8eac9f07565d84069087c84ea6d28d
                                                        • Instruction Fuzzy Hash: 88E160B0A10206CFDB14DFA9C848BADBBF1FF44344F158568E409AF2A5DB74E945CB82

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 502 93188f0-9318918 503 931891a 502->503 504 931891f-9318a7f 502->504 503->504 514 9318a81-9318a89 504->514 515 9318a97-9318ab5 504->515 516 9318a90-9318a96 514->516 517 9318a8b 514->517 519 9318b47-9318b67 515->519 520 9318abb-9318b02 515->520 516->515 517->516 523 9318b6d-9318c4b 519->523 524 9318dac-9318ddb 519->524 528 9318b0d-9318b30 520->528 542 9318d5c-9318d6c 523->542 529 9318b32-9318b39 528->529 530 9318b46 528->530 532 9318b40-9318b43 529->532 533 9318b3b 529->533 530->519 532->530 533->532 544 9318c50-9318c66 542->544 545 9318d72-9318d9c 542->545 548 9318c90 544->548 549 9318c68-9318c74 544->549 554 9318da8 545->554 555 9318d9e-9318da7 545->555 553 9318c96-9318cdc 548->553 551 9318c76-9318c7c 549->551 552 9318c7e-9318c84 549->552 556 9318c8e 551->556 552->556 560 9318cee-9318cf0 553->560 561 9318cde-9318cec 553->561 554->524 555->554 556->553 562 9318cf3-9318cfe 560->562 561->562 563 9318d00-9318d5a 562->563 564 9318d5b 562->564 563->564 564->542
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fcq$0oAp$PH^q
                                                        • API String ID: 0-3628400218
                                                        • Opcode ID: d640165e85d8e6b95087897999ef5444acb903bd0857e6926d67f143f187a8b6
                                                        • Instruction ID: 5dc9f0496bf159320e5caf64b97a268e7be03898857a4775066557229a6d2f43
                                                        • Opcode Fuzzy Hash: d640165e85d8e6b95087897999ef5444acb903bd0857e6926d67f143f187a8b6
                                                        • Instruction Fuzzy Hash: 7BE1C374E01218CFDB68DFA9D984B9DBBB2BF49300F1081AAD409AB365DB345E85CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 568 93188e0-9318918 570 931891a 568->570 571 931891f-9318a7f 568->571 570->571 581 9318a81-9318a89 571->581 582 9318a97-9318ab5 571->582 583 9318a90-9318a96 581->583 584 9318a8b 581->584 586 9318b47-9318b67 582->586 587 9318abb-9318b02 582->587 583->582 584->583 590 9318b6d-9318c4b 586->590 591 9318dac-9318ddb 586->591 595 9318b0d-9318b30 587->595 609 9318d5c-9318d6c 590->609 596 9318b32-9318b39 595->596 597 9318b46 595->597 599 9318b40-9318b43 596->599 600 9318b3b 596->600 597->586 599->597 600->599 611 9318c50-9318c66 609->611 612 9318d72-9318d9c 609->612 615 9318c90 611->615 616 9318c68-9318c74 611->616 621 9318da8 612->621 622 9318d9e-9318da7 612->622 620 9318c96-9318cdc 615->620 618 9318c76-9318c7c 616->618 619 9318c7e-9318c84 616->619 623 9318c8e 618->623 619->623 627 9318cee-9318cf0 620->627 628 9318cde-9318cec 620->628 621->591 622->621 623->620 629 9318cf3-9318cfe 627->629 628->629 630 9318d00-9318d5a 629->630 631 9318d5b 629->631 630->631 631->609
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fcq$0oAp$PH^q
                                                        • API String ID: 0-3628400218
                                                        • Opcode ID: ebc3f795504691110ba18274933a743f3a31847a53a71db6ca76df5df772c8e1
                                                        • Instruction ID: 6cacd54900220f5790904cc6b32aff54d4304905966fc44055e9791c2919138d
                                                        • Opcode Fuzzy Hash: ebc3f795504691110ba18274933a743f3a31847a53a71db6ca76df5df772c8e1
                                                        • Instruction Fuzzy Hash: FEC1B074E00218CFDB58DFA9D984B9DBBF2BF89300F1080AAD409AB365DB345A85CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LR^q
                                                        • API String ID: 0-2625958711
                                                        • Opcode ID: 1f66063729b670ece835bf3d0294eb565da61d57394bafd51ac524fc702bfaa1
                                                        • Instruction ID: fcdee3a0f167aeafd3bf71b13b86e9db5d1560082439fdc964f009d2410fcfc0
                                                        • Opcode Fuzzy Hash: 1f66063729b670ece835bf3d0294eb565da61d57394bafd51ac524fc702bfaa1
                                                        • Instruction Fuzzy Hash: 0861BEB5E012199FCB08CFAAD484AEDFBB2FF88301F14906AE415AB364DB349945CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 55c5fdf2f8fbdbf778ac672ca9fdc1e4551f957a29be62b1d5332e41d6593889
                                                        • Instruction ID: 40033e5c4bfe5878ba5279a22b594101937acb3b68ebf781d6a22c6a5481a373
                                                        • Opcode Fuzzy Hash: 55c5fdf2f8fbdbf778ac672ca9fdc1e4551f957a29be62b1d5332e41d6593889
                                                        • Instruction Fuzzy Hash: ACA2B274901229CFDB64DF68C984BD9BBB2BF49304F1491E9D448AB265DB31AEC5CF80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61c96437f0c3a97385e7c88be3eca425abdb7f0b84fabcc1a0a64396733bfac8
                                                        • Instruction ID: 8bc69124d159782c997e3926063b89e195150fc6cfc1900a47b2037960cc620b
                                                        • Opcode Fuzzy Hash: 61c96437f0c3a97385e7c88be3eca425abdb7f0b84fabcc1a0a64396733bfac8
                                                        • Instruction Fuzzy Hash: 4CF19474E012298FDB69DF65D998BDDB7B2BB89300F1081EAD80DA7260DB345E85CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d19f41676dbcdf7e6e3df358e958193ae9a125be86b1a4223c10412b8f9d031
                                                        • Instruction ID: 5b55995dc0db4a26a7d432c245af19d616fa85b63a6e94aba0795c01af6f7fb0
                                                        • Opcode Fuzzy Hash: 3d19f41676dbcdf7e6e3df358e958193ae9a125be86b1a4223c10412b8f9d031
                                                        • Instruction Fuzzy Hash: C8719275E012298FDB68DF66D8947DDBBB2AF89300F1481EAD81DA7264DB305E81CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 706 5400a30-5400a49 707 5400acc-5400acf 706->707 708 5400a4f-5400a53 706->708 709 5400ad0-5400b3e 708->709 710 5400a55-5400a6f 708->710 730 5400b44-5400b6a 709->730 731 5400bf8-5400bfd 709->731 715 5400a71-5400a78 710->715 716 5400a83-5400aa5 710->716 715->716 718 5400a7a-5400a7c 715->718 723 5400aac-5400aae 716->723 718->716 724 5400ab0-5400abc 723->724 725 5400ac5 723->725 724->725 729 5400abe 724->729 725->707 729->725 735 5400b7a-5400b7f 730->735 736 5400b6c-5400b77 730->736 737 5400b81 735->737 738 5400b88-5400b90 735->738 736->735 744 5400b83 call 77018c0 737->744 745 5400b83 call 77018b1 737->745 739 5400b92-5400bab 738->739 740 5400bb5-5400bee KiUserCallbackDispatcher 738->740 739->740 740->731 744->738 745->738
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(00000037,00000000,00000000,03F260D8,02FBA194,?,00000000,?,00000000,00000000,?,00000000), ref: 05400BE7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID: Hbq
                                                        • API String ID: 2492992576-1245868
                                                        • Opcode ID: fc2b32d8d317ad9bf8e19014f0563e006674d2a82793ddef2a31a85bd97526b7
                                                        • Instruction ID: 61a864cfff56ec1ed503f3f31b203cf46d96da97fd73325de084c8a7b0606880
                                                        • Opcode Fuzzy Hash: fc2b32d8d317ad9bf8e19014f0563e006674d2a82793ddef2a31a85bd97526b7
                                                        • Instruction Fuzzy Hash: 3E518F317046128FD718EF68C858B2E73EABFD4614F64806AE40ACB7A0CF74DD428B95
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 015ECA3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505872357.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15e0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 26341a54f97c5442eaaf6ec8844e5e7267d8d9a5ad3b1c3aa36aa547cdbcb0f6
                                                        • Instruction ID: 01ab6b114cf466e30779a8b8d6bf710656510fbda2e15926647397528554f90b
                                                        • Opcode Fuzzy Hash: 26341a54f97c5442eaaf6ec8844e5e7267d8d9a5ad3b1c3aa36aa547cdbcb0f6
                                                        • Instruction Fuzzy Hash: E58133B0A00B058FD768DF69D55875ABBF1BF88310F008A2DD49ADBB50D774E949CB90
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05403402
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 4d76dd86e93988c1cf2ddafe09f29189ce510730f381ff1c6778e76fbdaac529
                                                        • Instruction ID: 7733c414a662a705aadf3d25c695c7543e16c224266fcce1f24fae0f56e72e91
                                                        • Opcode Fuzzy Hash: 4d76dd86e93988c1cf2ddafe09f29189ce510730f381ff1c6778e76fbdaac529
                                                        • Instruction Fuzzy Hash: B151D0B1D003099FDB14CFAAC884ADEBFB5FF48310F24852AE819AB254D7759845CF91
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05403402
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 42fd306b6d7d970f80166c3c15cd1fb70e36abe20215094a54e34159ba318273
                                                        • Instruction ID: cd388d1c8786ac0c914a2aadb731c24840315e6407e54a7b627d7f080fbc483c
                                                        • Opcode Fuzzy Hash: 42fd306b6d7d970f80166c3c15cd1fb70e36abe20215094a54e34159ba318273
                                                        • Instruction Fuzzy Hash: ED51EFB1D003189FDB14CFAAC884ADEBFB5FF48310F24852AE819AB250D7749845CF91
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05405971
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: c7b94e3984c82eca14fa77eb950f14a5348c3fee7f4c4094da88e05b505a4799
                                                        • Instruction ID: 3e6a8c6c26646326c62cef4e7735e0b23bf6998eb1929989ca92d254485803c3
                                                        • Opcode Fuzzy Hash: c7b94e3984c82eca14fa77eb950f14a5348c3fee7f4c4094da88e05b505a4799
                                                        • Instruction Fuzzy Hash: AA411AB5900309CFDB14CF99C848AEABBF5FB88314F24C469D559AB361D774A841CFA0
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 015E6B21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505872357.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15e0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 9e6a1a396b5bffd44e90c2600fc02fc229ce7d28d8e9db783997ce7f1c820fd9
                                                        • Instruction ID: 096ef771026f3b91e86692d0e3ccd1482185f3f7e4b9be9e6a9ba4512792d067
                                                        • Opcode Fuzzy Hash: 9e6a1a396b5bffd44e90c2600fc02fc229ce7d28d8e9db783997ce7f1c820fd9
                                                        • Instruction Fuzzy Hash: 0741BFB0C0071DCADB28DFA9C848B9DBBF5BF58304F2484AAD409AB255DB756985CF90
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 015E6B21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505872357.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15e0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: f924fe0ff183fc13cfa018ba2eef783f84bc2bf068842ba0de6c1be21ef5c093
                                                        • Instruction ID: 2aadd9f361d54beb350e0a6f5e66025f8eb7a47eb190fd9b12b62e3666b3f3a7
                                                        • Opcode Fuzzy Hash: f924fe0ff183fc13cfa018ba2eef783f84bc2bf068842ba0de6c1be21ef5c093
                                                        • Instruction Fuzzy Hash: F041DFB1C00719CEDB28CFA9C848B9DBBF5BF58304F2484AAD408AB255DB756946CF90
                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 07707A3D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 52f1f27ad341d2ebcd1dc1859b16344b870fc647e662b662a106e0eae029e6f7
                                                        • Instruction ID: 1ff88f7a244dc2f1ab42207df5681021d9620462ccf58d8052beda5fe4a77296
                                                        • Opcode Fuzzy Hash: 52f1f27ad341d2ebcd1dc1859b16344b870fc647e662b662a106e0eae029e6f7
                                                        • Instruction Fuzzy Hash: A9216AB18043499FDB14CFA9C845BDEFFF8AF49310F14849AD454A7252C339A554CFA5
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,015EEC86,?,?,?,?,?), ref: 015EED47
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505872357.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15e0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: e2f3d38990d373f65c2cac98bc6a5d72509f427450c22048a48f589df4ca656c
                                                        • Instruction ID: e2438ce3e10279a20d78728925697e43e1af97f6853e64a773b23689c7c6051b
                                                        • Opcode Fuzzy Hash: e2f3d38990d373f65c2cac98bc6a5d72509f427450c22048a48f589df4ca656c
                                                        • Instruction Fuzzy Hash: BE21D4B5D002589FDB10CF9AD585ADEBFF4FB48310F14841AE958A7310D375A954CFA4
                                                        APIs
                                                        • GetClassInfoW.USER32(?,00000000), ref: 0770225C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ClassInfo
                                                        • String ID:
                                                        • API String ID: 3534257612-0
                                                        • Opcode ID: 277c92f55334e2e59f0e73a7c860607884b46fd60d59c1807ca4beeeaeac74b7
                                                        • Instruction ID: 498c1fa6a2b60e4a44fccf8cd39d3aa68fb14777ac78d0744e4301c30e9a23e7
                                                        • Opcode Fuzzy Hash: 277c92f55334e2e59f0e73a7c860607884b46fd60d59c1807ca4beeeaeac74b7
                                                        • Instruction Fuzzy Hash: 022107B2901719DFDB10CFAAD884BDEFBF8FB48350F14842AE858A7251D375A544CBA4
                                                        APIs
                                                        • GetClassInfoW.USER32(?,00000000), ref: 0770225C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ClassInfo
                                                        • String ID:
                                                        • API String ID: 3534257612-0
                                                        • Opcode ID: d9f1e7e89b091f551cb30e9ce9cfdbb353bf52211fec8b325d87abcc9e7590e7
                                                        • Instruction ID: 1734b6de0220c36d876529c8615d8f2d921abfc085866004658e82402f7f3336
                                                        • Opcode Fuzzy Hash: d9f1e7e89b091f551cb30e9ce9cfdbb353bf52211fec8b325d87abcc9e7590e7
                                                        • Instruction Fuzzy Hash: 182115B2901719DFDB10CFAAD884ADEFBF4FB48350F14842AE858A7241D374A944CBA4
                                                        APIs
                                                        • SetWindowTextW.USER32(?,00000000), ref: 0931FA1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: TextWindow
                                                        • String ID:
                                                        • API String ID: 530164218-0
                                                        • Opcode ID: a8bacecb614ae135c126dc896ccba43493a8ae47fe20eb119580b2c4c579f962
                                                        • Instruction ID: d3b053a2db31f8b1e6894f484a1ab8c4ae0efc658447199e07b6812fe196edd8
                                                        • Opcode Fuzzy Hash: a8bacecb614ae135c126dc896ccba43493a8ae47fe20eb119580b2c4c579f962
                                                        • Instruction Fuzzy Hash: E71114B68006598FDB14CF9AC844BDEFBF4EB48320F14C02AE868B7250D738A545CFA5
                                                        APIs
                                                        • SetWindowTextW.USER32(?,00000000), ref: 0931FA1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: TextWindow
                                                        • String ID:
                                                        • API String ID: 530164218-0
                                                        • Opcode ID: ca527b396838a7f58e58b364d82f070e1af2cebcc5ef5dc0cf984199a436fefa
                                                        • Instruction ID: 21a515eca9542d95aca1fccaecd8fe3d45f6fa53a4f947aac8437fe69aceec88
                                                        • Opcode Fuzzy Hash: ca527b396838a7f58e58b364d82f070e1af2cebcc5ef5dc0cf984199a436fefa
                                                        • Instruction Fuzzy Hash: 381123B68002598FDB14CF9AC444BDEFBF4EB88320F14C02AE868A7250D338A545CFA5
                                                        APIs
                                                        • PostMessageW.USER32(?,?,?,?), ref: 07707A3D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: bc1df42bb3c70f65fcbf8114fe8e7ab6938e88e686a7bba82817f463438ee06e
                                                        • Instruction ID: 1ee880c8aae4dc3583f638440a86cac87e1bd5e4447df42d31c2a8974292b212
                                                        • Opcode Fuzzy Hash: bc1df42bb3c70f65fcbf8114fe8e7ab6938e88e686a7bba82817f463438ee06e
                                                        • Instruction Fuzzy Hash: 7C113AB1800309DFDB10CF9AC445BDEFBF8EB48360F108419E554A3250C378A544CFA5
                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 0770122D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: ba07842f88436589e33cdfaacd61274638660d5fea0b0ff6e503d1d87ea0509b
                                                        • Instruction ID: a1fb11de551af5a77abcca1183e71a0bad1e20080f62868a360c9e28eccdcb27
                                                        • Opcode Fuzzy Hash: ba07842f88436589e33cdfaacd61274638660d5fea0b0ff6e503d1d87ea0509b
                                                        • Instruction Fuzzy Hash: 351122B5800318DFCB10DF9AD849BDEBBF8EB48320F108419E458A7210C375A580CFA4
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 015ECA3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505872357.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_15e0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 3af3c42a4bf87d0f94d6d8fa7d0c7228e2004f900d2781f8d059d4690d105c0e
                                                        • Instruction ID: 08b7cfa4ce57e9ea1bebb0b6c43d692c1ff5b7be567b7d9b5c3e64b6be255f59
                                                        • Opcode Fuzzy Hash: 3af3c42a4bf87d0f94d6d8fa7d0c7228e2004f900d2781f8d059d4690d105c0e
                                                        • Instruction Fuzzy Hash: BF11E3B5C003598FDB14CF9AD444ADEFBF4BB48314F10846AD569A7210C375A545CFA5
                                                        APIs
                                                        • SetTimer.USER32(?,01606428,?,?,?,?,?,?,0931DA08,00000000,00000000,?), ref: 0931DB8D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Timer
                                                        • String ID:
                                                        • API String ID: 2870079774-0
                                                        • Opcode ID: d504132cadd5e4b72e6bd8eecda1028ee133d520ce3b005650f5a7ca49f54fa0
                                                        • Instruction ID: 9bf2e8a25ccae509c10b37e983aa86ff0ba958fb4c7820ccc7b961435d454987
                                                        • Opcode Fuzzy Hash: d504132cadd5e4b72e6bd8eecda1028ee133d520ce3b005650f5a7ca49f54fa0
                                                        • Instruction Fuzzy Hash: E911F5B5800358DFDB10DF9AC445BDEBFF8EB48360F108419E569A7650C375A984CFA5
                                                        APIs
                                                        • SetTimer.USER32(?,01606428,?,?,?,?,?,?,0931DA08,00000000,00000000,?), ref: 0931DB8D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Timer
                                                        • String ID:
                                                        • API String ID: 2870079774-0
                                                        • Opcode ID: 628edc3b149923b1e3913897ebc639c811178070f01d245fcb0c164b1a20648c
                                                        • Instruction ID: fc57b1452fbe44ff957a8f1d5c28bf9565dcafd2fc98af1eb381366559e0a3a1
                                                        • Opcode Fuzzy Hash: 628edc3b149923b1e3913897ebc639c811178070f01d245fcb0c164b1a20648c
                                                        • Instruction Fuzzy Hash: 9E1103B58003489FDB10DF9AC845BDEBFF8EB58720F108419E569A7250C375A584CFA5
                                                        APIs
                                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,05403520,?,?,?,?), ref: 05403595
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LongWindow
                                                        • String ID:
                                                        • API String ID: 1378638983-0
                                                        • Opcode ID: afdccc1216a5b2fd8500c7860fe79d038ac059a8b3d7f92a1b8fe599f896baf6
                                                        • Instruction ID: 214fdaecc9071cf9b448a654a1307ecd456377c74f8b98b9892ca96e3fc2cd0a
                                                        • Opcode Fuzzy Hash: afdccc1216a5b2fd8500c7860fe79d038ac059a8b3d7f92a1b8fe599f896baf6
                                                        • Instruction Fuzzy Hash: 7E1103B58002489FDB10DF9AC489BDEBFF8FB48324F20845AD959A7750C379A944CFA5
                                                        APIs
                                                        • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,05403520,?,?,?,?), ref: 05403595
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LongWindow
                                                        • String ID:
                                                        • API String ID: 1378638983-0
                                                        • Opcode ID: da7cbb16d3d2a94bbfa1c8e20765abd95cd9bbe3879e509720e3685152c0081b
                                                        • Instruction ID: 047e11e4575617b82ce32dc22bbb38e1119dbcc9a85e2cb220b7772d8d6a9ead
                                                        • Opcode Fuzzy Hash: da7cbb16d3d2a94bbfa1c8e20765abd95cd9bbe3879e509720e3685152c0081b
                                                        • Instruction Fuzzy Hash: 9811F5B58002489FDB10DF9AD484BDEBFF8EB48324F20845AE959A7351C375A944CFA5
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 07708295
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: eec08e47a0ee6cb1bfeeca55208383d4e90b8eebe733c4e6796824a016f37a1f
                                                        • Instruction ID: 2b8d17026c73d68f482ce45a715a7363f3bd39aa9f4c5f383f2e94ba87de52c1
                                                        • Opcode Fuzzy Hash: eec08e47a0ee6cb1bfeeca55208383d4e90b8eebe733c4e6796824a016f37a1f
                                                        • Instruction Fuzzy Hash: 4B1115B5900758CFDB20DFAAC444BDEBFF4EB48364F208459D558A7250C379A944CFA5
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 07708295
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: 154d6fc7a07871efa68965e30cd119d52b057c560fff522f90ca25037b938f1e
                                                        • Instruction ID: 1d11cb33f113b56a618f5ff904e948960ee39b8f3dc4d99c53175127339cc333
                                                        • Opcode Fuzzy Hash: 154d6fc7a07871efa68965e30cd119d52b057c560fff522f90ca25037b938f1e
                                                        • Instruction Fuzzy Hash: FE1133B5800348CFCB20CFAAD489BDEBFF4AB48324F24846AD458A7250C375A544CFA5
                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 077040AD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 24f1638bffcc34e9d170f68db1c84706f9e58f89a99edfe3784edc65f77f77dc
                                                        • Instruction ID: 1c4d09d2bc4d193135f0665e90578e1452cb3ea3c541fb26574c1ecb430cced2
                                                        • Opcode Fuzzy Hash: 24f1638bffcc34e9d170f68db1c84706f9e58f89a99edfe3784edc65f77f77dc
                                                        • Instruction Fuzzy Hash: DD11F2B5800359DFDB10DF9AC845BDEBBF8EB48320F208459E558A7250C379A584CFA5
                                                        APIs
                                                        • DispatchMessageW.USER32(00000000), ref: 0770921D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DispatchMessage
                                                        • String ID:
                                                        • API String ID: 2061451462-0
                                                        • Opcode ID: 07fee93249a4c174d0dbb4f4d592b6271165b0254cbbe8b8fa6ded68f951e9a9
                                                        • Instruction ID: 888884fd82628d9f46620cbf5cd9e76a20452a447bf46e4441e081349df4795d
                                                        • Opcode Fuzzy Hash: 07fee93249a4c174d0dbb4f4d592b6271165b0254cbbe8b8fa6ded68f951e9a9
                                                        • Instruction Fuzzy Hash: 2811FEB1C00259CFCB10DFAAD844ADEFBF8EB48324F20846AD569A7251C379A544CFA5
                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 0770122D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: a9b4f6f99ea49643df325ea89199cf17defa004874a083d4b56f92e0e85fce8c
                                                        • Instruction ID: b47239e339e4dc15fe4436db31cb69be530750eff305d0cc6febab2cdee5b717
                                                        • Opcode Fuzzy Hash: a9b4f6f99ea49643df325ea89199cf17defa004874a083d4b56f92e0e85fce8c
                                                        • Instruction Fuzzy Hash: 821100B5800359DFDB10DF9AD884BDEBBF8EB48320F20841AE558A7250C375A984CFA5
                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 077040AD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: a32f90404f08f72e671bca80dc4f1ef2cd021bab82474aa7c56441bdac7cefff
                                                        • Instruction ID: 0156aeee87ccebe962f411c2baa37a79aeb473d12b2b6ad691fb3a5695b14a31
                                                        • Opcode Fuzzy Hash: a32f90404f08f72e671bca80dc4f1ef2cd021bab82474aa7c56441bdac7cefff
                                                        • Instruction Fuzzy Hash: 071103B5800349DFDB10DF9AC444BDEBBF8FB48320F108459D558A7250C375A584CFA5
                                                        APIs
                                                        • DispatchMessageW.USER32(00000000), ref: 0770921D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DispatchMessage
                                                        • String ID:
                                                        • API String ID: 2061451462-0
                                                        • Opcode ID: 2a8ae6d19b107a269393e9356b8903ed6a1fcce3ed4fe606dd00fc6c7d3f5362
                                                        • Instruction ID: 9ee0dd749a62b8b46ae5ab2742e7ba0ec0ca2df109498588fd499b592b26050f
                                                        • Opcode Fuzzy Hash: 2a8ae6d19b107a269393e9356b8903ed6a1fcce3ed4fe606dd00fc6c7d3f5362
                                                        • Instruction Fuzzy Hash: 811100B1C00259CFCB10DF9AD444BDEFBF4EB48320F10842AD568A7250C378A544CFA5
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0931326A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: 8f1aad9714b53202cfb029a44afe9c110b727fb8710f3ec084652036e85f9863
                                                        • Instruction ID: 06d20191bb4558268f7bbe2a55ceb37343a8775d8f3215252389dfa799f77678
                                                        • Opcode Fuzzy Hash: 8f1aad9714b53202cfb029a44afe9c110b727fb8710f3ec084652036e85f9863
                                                        • Instruction Fuzzy Hash: F8E04872700714B7CB1CBE79DC2AE7B37AAEB85A50744857DE505CB7A1DE24EC0287A0
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0931326A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: 750bec7e0875b295ca46af513e8e6e89160ccbce14385436338e8f0038d0199f
                                                        • Instruction ID: 21820fdf9cdff687dc60f0066e55f8dbe455fc378d0224d15e68f9b0d5a8a231
                                                        • Opcode Fuzzy Hash: 750bec7e0875b295ca46af513e8e6e89160ccbce14385436338e8f0038d0199f
                                                        • Instruction Fuzzy Hash: E8E01271700224AB8B18BA7AD419C6F77EDAF85A60351456EE406CB361EE65EC028790
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505338057.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_123d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 070409013d3c3e35ceb8b88e19ac5b6e651e74fe18c35d246291ad16eeaf889e
                                                        • Instruction ID: d275624fec15b5859fbcd5ee130355bfce9e60cf317c5f51215f97dbc92396ad
                                                        • Opcode Fuzzy Hash: 070409013d3c3e35ceb8b88e19ac5b6e651e74fe18c35d246291ad16eeaf889e
                                                        • Instruction Fuzzy Hash: 4E2145B1110208DFDB01DF58D9C0B66BF65FBD4314F60C569EA090B256C336E456C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505338057.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_123d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1cc667ac488e6e79324eb0053e12e668c45a2aa9cb5c497ad3c9bd42d6b02463
                                                        • Instruction ID: fcff0e9157e6ddb8c70561e9b12022f44143ec0d4ddfa24e2b23205298479154
                                                        • Opcode Fuzzy Hash: 1cc667ac488e6e79324eb0053e12e668c45a2aa9cb5c497ad3c9bd42d6b02463
                                                        • Instruction Fuzzy Hash: 372142B2510208DFCB01DF58E9C0B2ABF65FBC8318F60C169E9094B296C336D456CAA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505383024.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_124d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2af1157889464c16ac419c27e0ca1140e42e4fd7011ffa5e132910b4fd6b860
                                                        • Instruction ID: 9bad82446211a701049bdf35b5e8d1af81ff9a496cb8cd2bed60513468efd50b
                                                        • Opcode Fuzzy Hash: a2af1157889464c16ac419c27e0ca1140e42e4fd7011ffa5e132910b4fd6b860
                                                        • Instruction Fuzzy Hash: FB214671614208EFDB09DF98C9C0B26BBA5FB94324F20C66DE9094B357C376D846CA61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505383024.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_124d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7fe300090ae8dfc1ff01947f67a363229b24cf16801a9f6a19b0780b34d337a
                                                        • Instruction ID: 3e9bf77fb310cebe521fdc4a533cb71e1ab13f69b8c8fc0cfd08e9feaa5ad98a
                                                        • Opcode Fuzzy Hash: f7fe300090ae8dfc1ff01947f67a363229b24cf16801a9f6a19b0780b34d337a
                                                        • Instruction Fuzzy Hash: 23214270214208DFCB19DFA8D984B26BFA1EB94314F20C56DD90A4B256C37AD407CA61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505383024.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_124d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f538d7ea208d202c13ce37ea958081171c35d2a97689468923043d266a2739c8
                                                        • Instruction ID: e7112512cbd9b9ce16659d92ba835b3be9fd12a33955ea78e8e5dc54c66937ca
                                                        • Opcode Fuzzy Hash: f538d7ea208d202c13ce37ea958081171c35d2a97689468923043d266a2739c8
                                                        • Instruction Fuzzy Hash: E5219F755083849FCB07CF64D994B11BF71EB56314F28C5EAD9498F2A7C33A980ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505338057.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_123d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction ID: 34385cf41d1567fab0126a48fd24f85936b364bb6dcf6cf04db54acfbaf837ae
                                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction Fuzzy Hash: 541103B2404284DFDB12CF54D5C4B56BF71FB94314F24C5AADA090B657C336D45ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505338057.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_123d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction ID: 30c0269150213999b75070a8776d702e2f4417c99fa67750fa73416178570b7f
                                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction Fuzzy Hash: 4E1103B2404284CFCB02CF54D5C4B16BF72FB84318F24C5A9D9094B657C336D45ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3505383024.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_124d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction ID: 7942a3ab318ac69144f7dd888e37c2b35bc2e15b268d804522274b08d984f7d2
                                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction Fuzzy Hash: B211BB75504284DFDB06CF54C5C4B15BFA1FB84224F24C6AAD9494B297C33AD40ACB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507554203.0000000007700000.00000040.00000800.00020000.00000000.sdmp, Offset: 07700000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7700000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a58a7985e20db5d5cdb01910d8f5bc8b1651f36540c27218ac9cceabec8bc613
                                                        • Instruction ID: 72b2d7450dda12871a6a15f20530a7145eb1a874ac18cfda2aaeebee23c2f31a
                                                        • Opcode Fuzzy Hash: a58a7985e20db5d5cdb01910d8f5bc8b1651f36540c27218ac9cceabec8bc613
                                                        • Instruction Fuzzy Hash: EBE160F4710691CBDB189B34C598A2D72E6AFDA684F14486AD606CB3E5DF34DC02CBC2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29e553dc66a8ef263a5007bdeca67936b18e15f21248369156e994eccc46788e
                                                        • Instruction ID: b73bfe351aaac3afc6bbd3e63811eb8497d2abd2984321a3545bad516a9b83e5
                                                        • Opcode Fuzzy Hash: 29e553dc66a8ef263a5007bdeca67936b18e15f21248369156e994eccc46788e
                                                        • Instruction Fuzzy Hash: 79F1A074D012298FCB64DF69C984BDDBBF2AF89304F1491E9D449AB265DB309E85CF40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 826800215101402dce2bb48da89323f7a81717657a4be54389b0d936426bb12d
                                                        • Instruction ID: 38a5bb6da42154c92418e98390c7edb3095761cdcc37587c40318c56bcda2401
                                                        • Opcode Fuzzy Hash: 826800215101402dce2bb48da89323f7a81717657a4be54389b0d936426bb12d
                                                        • Instruction Fuzzy Hash: D71296B2411746CAE732CF25EC4C18A7BB1FB41318F50630AD2666B2E9DBB4156BCF48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 85e30b358115562bc58a444cd9f2bec047ccb2892c4b591b7f71d78f315a46e8
                                                        • Instruction ID: cb7193e1d9906a143cf94f33739efd84d03ed409dd08e63aaa05d6d488a4df09
                                                        • Opcode Fuzzy Hash: 85e30b358115562bc58a444cd9f2bec047ccb2892c4b591b7f71d78f315a46e8
                                                        • Instruction Fuzzy Hash: DBA14F32E102168FCF19DFB4C8445DEB7B2FF84301B6545BAE80AAB265DB71E956CB40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3506670531.0000000005400000.00000040.00000800.00020000.00000000.sdmp, Offset: 05400000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5400000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e3deecb7688ba284e30927c6cf2933d48d07b4c2b19beca7ff137e2777940fe
                                                        • Instruction ID: cba681cad95a13f57d44a8f15a23d4b619c55fc3e20354fc61e91acc94359502
                                                        • Opcode Fuzzy Hash: 6e3deecb7688ba284e30927c6cf2933d48d07b4c2b19beca7ff137e2777940fe
                                                        • Instruction Fuzzy Hash: 94C1ECB2810746CBD722DF64EC4C18A7BB1FB85318F50670AD1626B2E8DBB4156BCF48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c580ae2cc60db777f4e42e3686cd4c8cb604754dee0874b2478b20611416f033
                                                        • Instruction ID: e8c8f83ac2f60d19dd21e8010ad952ced2cefd605d62e91c9e2e1b4f641a0528
                                                        • Opcode Fuzzy Hash: c580ae2cc60db777f4e42e3686cd4c8cb604754dee0874b2478b20611416f033
                                                        • Instruction Fuzzy Hash: C7A1C23494522ACFDB29CF24C998BE9BBB1BF49305F1485E9E409A7261DB349EC5CF40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8cacf88b127bc375000704d1cf568631d228c6f1025d785765c9fa7602210667
                                                        • Instruction ID: 80574e9ca131c89ff7d27dd8c0da2e63c2225453c4412fe05eaaaddd2baa0cfa
                                                        • Opcode Fuzzy Hash: 8cacf88b127bc375000704d1cf568631d228c6f1025d785765c9fa7602210667
                                                        • Instruction Fuzzy Hash: 7A819074E402298FDB69DF69C9907DEBBB2AF89304F1091E9D40DA7264DB305E85CF41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dd5099bdf6ae3b958939ff475e2c6e485eb7a47781ab6b9b30304389f3813c52
                                                        • Instruction ID: 1fe53fd7947529b0d06ef15bdeed86100a0d0034db4d9c6f14af7ff3259e0d57
                                                        • Opcode Fuzzy Hash: dd5099bdf6ae3b958939ff475e2c6e485eb7a47781ab6b9b30304389f3813c52
                                                        • Instruction Fuzzy Hash: B86170B5E012199FCB08CFAAD98099EFBF2BF89300F14D129E419AB254DB346946CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 217fe4ad7355e3e9c7b68340250ff3cc481704e490c4de0beaf8b018a810a441
                                                        • Instruction ID: debe252f8f9f32b7b2272e2e0740e17c45e1c98a4df6b89d35e2e824a5db7198
                                                        • Opcode Fuzzy Hash: 217fe4ad7355e3e9c7b68340250ff3cc481704e490c4de0beaf8b018a810a441
                                                        • Instruction Fuzzy Hash: F931A2B5E016199BDB18CFAAD8446DEFBF2AFC9300F14C12AD418BB254DB341946CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3507654113.0000000009310000.00000040.00000800.00020000.00000000.sdmp, Offset: 09310000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_9310000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ad775df7ed0d6ed7858d3cc9c195ab1d782cb6fdfce3318bb03a33b3220559b3
                                                        • Instruction ID: 379d7f9ba1d0b18afb2482e8b9cfa700fb303a1a583652771a348bccec354eac
                                                        • Opcode Fuzzy Hash: ad775df7ed0d6ed7858d3cc9c195ab1d782cb6fdfce3318bb03a33b3220559b3
                                                        • Instruction Fuzzy Hash: 8E318C75E056288BEB68CF679C447DAFAF7AFC9300F04C1BAD44CA6254DB301A858F41