Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aclatis tool.exe

Overview

General Information

Sample name:Aclatis tool.exe
Analysis ID:1572856
MD5:1f1d045c85370801e98c4e5a05f0a922
SHA1:720ede2f5c4f866436be8499642904091c97d3ae
SHA256:eacbd7f909bc29060a2915065b63543940c4b6a8e84a1bac9b4bf582b4bb6797
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Aclatis tool.exe (PID: 3084 cmdline: "C:\Users\user\Desktop\Aclatis tool.exe" MD5: 1F1D045C85370801E98C4E5A05F0A922)
    • WerFault.exe (PID: 4588 cmdline: C:\Windows\system32\WerFault.exe -u -p 3084 -s 5608 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Aclatis tool.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    Aclatis tool.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.2394841899.0000012BEA190000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000000.1680525496.0000012BE7524000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Process Memory Space: Aclatis tool.exe PID: 3084JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                SourceRuleDescriptionAuthorStrings
                0.2.Aclatis tool.exe.12beaa70000.7.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.2.Aclatis tool.exe.12b905422f8.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.2.Aclatis tool.exe.12bea190000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      0.2.Aclatis tool.exe.12bea190000.6.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                        0.0.Aclatis tool.exe.12be7390000.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                          Click to see the 1 entries
                          No Sigma rule has matched
                          No Suricata rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: Aclatis tool.exeAvira: detected
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                          Source: Aclatis tool.exeJoe Sandbox ML: detected
                          Source: Aclatis tool.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 198.54.115.125:443 -> 192.168.2.4:49732 version: TLS 1.2
                          Source: Aclatis tool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: mscorlib.pdbD source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Xml.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.pdb` source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: ^&indoC:\Windows\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: costura.costura.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: costura.plist-cil.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: System.Drawing.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Configuration.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb+z source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Configuration.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Drawing.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\VASKE\source\repos\VASKE\MobileDevice\obj\Debug\MobileDevice.pdb source: Aclatis tool.exe, 00000000.00000002.2394587885.0000012BEA0C2000.00000002.00000001.01000000.0000000F.sdmp
                          Source: Binary string: System.Xml.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: MobileDevice.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: ^&pC:\Users\user\Desktop\Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.Core.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\VASKE\source\repos\VASKE\MobileDevice\obj\Debug\MobileDevice.pdb|5 source: Aclatis tool.exe, 00000000.00000002.2394587885.0000012BEA0C2000.00000002.00000001.01000000.0000000F.sdmp
                          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2393693325.0000012BEA07C000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Users\user\Desktop\Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDAF0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbfz source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Drawing.pdb/ source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: mscorlib.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\user\Desktop\Aclatis tool.PDB=@ source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDAF0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: ool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Drawing.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Management.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: mscorlib.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Management.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDBB7000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Core.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: Acostura.plist-cil.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: costura.plist-cil.pdb.compressed source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Core.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then cmp dword ptr [ebp-58h], 00000000h0_2_00007FFD9B89D415
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then jmp 00007FFD9B89C1C1h0_2_00007FFD9B89B461
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then jmp 00007FFD9B89CF82h0_2_00007FFD9B89B461
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then jmp 00007FFD9B89CF81h0_2_00007FFD9B89B461
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then cmp dword ptr [ebp-58h], 00000000h0_2_00007FFD9B89D430
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then jmp 00007FFD9B887126h0_2_00007FFD9B886F1E
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 4x nop then cmp dword ptr [ebp-58h], 00000000h0_2_00007FFD9B89D4D3

                          Networking

                          barindex
                          Source: Yara matchFile source: Aclatis tool.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.Aclatis tool.exe.12beaa70000.7.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.Aclatis tool.exe.12b905422f8.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.0.Aclatis tool.exe.12be7390000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                          Source: global trafficHTTP traffic detected: GET /icloud/version_check/aclatis_tool.php HTTP/1.1Host: api.dmralawm.comAccept-Encoding: gzip, deflateConnection: Keep-Alive
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficHTTP traffic detected: GET /icloud/version_check/aclatis_tool.php HTTP/1.1Host: api.dmralawm.comAccept-Encoding: gzip, deflateConnection: Keep-Alive
                          Source: global trafficDNS traffic detected: DNS query: keyauth.win
                          Source: global trafficDNS traffic detected: DNS query: api.dmralawm.com
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmp, Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B800D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                          Source: Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B800D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.dmralawm.com
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B800D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.dmralawm.com/icloud/version_check/aclatis_tool.php
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/api/licensing.php
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/pricing
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                          Source: unknownHTTPS traffic detected: 198.54.115.125:443 -> 192.168.2.4:49732 version: TLS 1.2

                          System Summary

                          barindex
                          Source: Aclatis tool.exeStatic PE information: section name: +14L
                          Source: Aclatis tool.exeStatic PE information: section name:
                          Source: Aclatis tool.exeStatic PE information: section name:
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess Stats: CPU usage > 49%
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9B88F38D NtQueryInformationProcess,0_2_00007FFD9B88F38D
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9B88D1720_2_00007FFD9B88D172
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9B88BD1A0_2_00007FFD9B88BD1A
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9B88B59D0_2_00007FFD9B88B59D
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3084 -s 5608
                          Source: Aclatis tool.exe, 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs Aclatis tool.exe
                          Source: Aclatis tool.exe, 00000000.00000002.2384048400.0000012B90542000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs Aclatis tool.exe
                          Source: Aclatis tool.exe, 00000000.00000002.2384048400.0000012B9006A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs Aclatis tool.exe
                          Source: Aclatis tool.exe, 00000000.00000002.2394587885.0000012BEA0C2000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: OriginalFilenameMobileDevice.dll: vs Aclatis tool.exe
                          Source: Aclatis tool.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          Source: Aclatis tool.exeStatic PE information: Section: +14L ZLIB complexity 1.0003087414089347
                          Source: 0.2.Aclatis tool.exe.12b905422f8.1.raw.unpack, G22190F0D5B1120504B3E00280003060D0F0F4F3B300802384B21170B1B1507061C3811061E.csCryptographic APIs: 'CreateDecryptor'
                          Source: 0.2.Aclatis tool.exe.12beaa70000.7.raw.unpack, G22190F0D5B1120504B3E00280003060D0F0F4F3B300802384B21170B1B1507061C3811061E.csCryptographic APIs: 'CreateDecryptor'
                          Source: classification engineClassification label: mal92.troj.evad.winEXE@2/5@2/1
                          Source: C:\Users\user\Desktop\Aclatis tool.exeMutant created: NULL
                          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3084
                          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1ca8c6c9-1ad6-44e4-9932-58236c573aa0Jump to behavior
                          Source: Aclatis tool.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          Source: C:\Users\user\Desktop\Aclatis tool.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeFile read: C:\Users\user\Desktop\Aclatis tool.exe.configJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\Aclatis tool.exe "C:\Users\user\Desktop\Aclatis tool.exe"
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3084 -s 5608
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: windowscodecs.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: iconcodecservice.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Users\user\Desktop\Aclatis tool.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                          Source: Aclatis tool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: Aclatis tool.exeStatic file information: File size 8566304 > 1048576
                          Source: Aclatis tool.exeStatic PE information: Raw size of +14L is bigger than: 0x100000 < 0x190200
                          Source: Aclatis tool.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x681e00
                          Source: Aclatis tool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: mscorlib.pdbD source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Xml.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.pdb` source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: ^&indoC:\Windows\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: costura.costura.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: costura.plist-cil.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: System.Drawing.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Configuration.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb+z source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Configuration.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Drawing.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\VASKE\source\repos\VASKE\MobileDevice\obj\Debug\MobileDevice.pdb source: Aclatis tool.exe, 00000000.00000002.2394587885.0000012BEA0C2000.00000002.00000001.01000000.0000000F.sdmp
                          Source: Binary string: System.Xml.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: MobileDevice.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: ^&pC:\Users\user\Desktop\Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.Core.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\VASKE\source\repos\VASKE\MobileDevice\obj\Debug\MobileDevice.pdb|5 source: Aclatis tool.exe, 00000000.00000002.2394587885.0000012BEA0C2000.00000002.00000001.01000000.0000000F.sdmp
                          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2393693325.0000012BEA07C000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Users\user\Desktop\Aclatis tool.PDB source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDAF0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbfz source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDB57000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Drawing.pdb/ source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: mscorlib.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: C:\Users\user\Desktop\Aclatis tool.PDB=@ source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDAF0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: ool.PDB source: Aclatis tool.exe, 00000000.00000002.2376141520.000000265E1D2000.00000004.00000010.00020000.00000000.sdmp
                          Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Drawing.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Management.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: mscorlib.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Management.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aclatis tool.exe, 00000000.00000002.2407710536.0000012BEDBB7000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.Core.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: Acostura.plist-cil.pdb.compressed source: Aclatis tool.exe
                          Source: Binary string: costura.plist-cil.pdb.compressed source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.ni.pdb source: WER661D.tmp.dmp.4.dr
                          Source: Binary string: System.Core.ni.pdbRSDS source: WER661D.tmp.dmp.4.dr

                          Data Obfuscation

                          barindex
                          Source: C:\Users\user\Desktop\Aclatis tool.exeUnpacked PE file: 0.2.Aclatis tool.exe.12be7390000.4.unpack +14L:EW;Unknown_Section1:ER;Unknown_Section2:R;.Enigma:EW;UPX:ER;XD.C59B5:R;.UPX:R;.reloc:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:EW;Unknown_Section4:ER;Unknown_Section5:R;Unknown_Section6:R;Unknown_Section7:R;
                          Source: Yara matchFile source: Aclatis tool.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.Aclatis tool.exe.12bea190000.6.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.Aclatis tool.exe.12bea190000.6.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.0.Aclatis tool.exe.12be7390000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2394841899.0000012BEA190000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.1680525496.0000012BE7524000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: Aclatis tool.exe PID: 3084, type: MEMORYSTR
                          Source: Aclatis tool.exeStatic PE information: 0xE52B2DAB [Fri Nov 2 03:23:23 2091 UTC]
                          Source: initial sampleStatic PE information: section where entry point is pointing to: UPX
                          Source: Aclatis tool.exeStatic PE information: real checksum: 0x82eae9 should be: 0x832742
                          Source: Aclatis tool.exeStatic PE information: section name: +14L
                          Source: Aclatis tool.exeStatic PE information: section name:
                          Source: Aclatis tool.exeStatic PE information: section name:
                          Source: Aclatis tool.exeStatic PE information: section name: .Enigma
                          Source: Aclatis tool.exeStatic PE information: section name: UPX
                          Source: Aclatis tool.exeStatic PE information: section name: XD.C59B5
                          Source: Aclatis tool.exeStatic PE information: section name: .UPX
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9BBB50DE push esp; iretd 0_2_00007FFD9BBB50E0
                          Source: Aclatis tool.exeStatic PE information: section name: +14L entropy: 7.9998957138352
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\Desktop\Aclatis tool.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                          Source: C:\Users\user\Desktop\Aclatis tool.exeMemory allocated: 12BE7F00000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeMemory allocated: 12BE97F0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sysJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sysJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeFile opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sysJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeWindow / User API: threadDelayed 351Jump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeLast function: Thread delayed
                          Source: Amcache.hve.4.drBinary or memory string: VMware
                          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                          Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                          Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                          Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                          Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                          Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                          Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                          Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                          Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                          Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                          Source: Aclatis tool.exe, 00000000.00000002.2393693325.0000012BE9FC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[[
                          Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                          Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                          Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                          Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                          Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                          Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                          Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                          Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                          Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys
                          Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                          Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
                          Source: Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys
                          Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess information queried: ProcessInformationJump to behavior

                          Anti Debugging

                          barindex
                          Source: C:\Users\user\Desktop\Aclatis tool.exeCode function: 0_2_00007FFD9B89D415 CheckRemoteDebuggerPresent,0_2_00007FFD9B89D415
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Users\user\Desktop\Aclatis tool.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Users\user\Desktop\MobileDevice.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\Aclatis tool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                          Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                          Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                          Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          Process Injection
                          13
                          Virtualization/Sandbox Evasion
                          OS Credential Dumping1
                          Query Registry
                          Remote Services11
                          Archive Collected Data
                          11
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          LSASS Memory331
                          Security Software Discovery
                          Remote Desktop ProtocolData from Removable Media1
                          Ingress Tool Transfer
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                          Process Injection
                          Security Account Manager13
                          Virtualization/Sandbox Evasion
                          SMB/Windows Admin SharesData from Network Shared Drive2
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Deobfuscate/Decode Files or Information
                          NTDS1
                          Process Discovery
                          Distributed Component Object ModelInput Capture3
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                          Obfuscated Files or Information
                          LSA Secrets1
                          Application Window Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                          Software Packing
                          Cached Domain Credentials12
                          System Information Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Timestomp
                          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          DLL Side-Loading
                          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          Aclatis tool.exe100%AviraHEUR/AGEN.1310356
                          Aclatis tool.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          https://api.dmralawm.com/icloud/version_check/aclatis_tool.php0%Avira URL Cloudsafe
                          https://api.dmralawm.com0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          keyauth.win
                          104.26.0.5
                          truefalse
                            high
                            api.dmralawm.com
                            198.54.115.125
                            truefalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://api.dmralawm.com/icloud/version_check/aclatis_tool.phpfalse
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.apache.org/licenses/LICENSE-2.0Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/?Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers?Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.dmralawm.comAclatis tool.exe, 00000000.00000002.2376605761.0000012B800D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.tiro.comAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://upx.sf.netAmcache.hve.4.drfalse
                                              high
                                              http://www.fontbureau.com/designersAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.goodfont.co.krAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.carterandcone.comlAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sajatypeworks.comAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.typography.netDAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.com/designers/cabarga.htmlNAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cn/cTheAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.galapagosdesign.com/staff/dennis.htmAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.founder.com.cn/cnAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.fontbureau.com/designers/frere-user.htmlAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.jiyu-kobo.co.jp/Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.galapagosdesign.com/DPleaseAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.fontbureau.com/designers8Aclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.fonts.comAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.sandoll.co.krAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://gunaui.com/api/licensing.phpAclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.urwpp.deDPleaseAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.zhongyicts.com.cnAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAclatis tool.exe, 00000000.00000002.2376605761.0000012B800D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.sakkal.comAclatis tool.exe, 00000000.00000002.2404078320.0000012BEBFB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://gunaui.com/Aclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://gunaui.com/pricingAclatis tool.exe, 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          198.54.115.125
                                                                                          api.dmralawm.comUnited States
                                                                                          22612NAMECHEAP-NETUSfalse
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1572856
                                                                                          Start date and time:2024-12-11 02:30:33 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 6m 24s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Run name:Run with higher sleep bypass
                                                                                          Number of analysed new started processes analysed:9
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:Aclatis tool.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal92.troj.evad.winEXE@2/5@2/1
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HCA Information:Failed
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 52.182.143.212, 184.30.17.174, 4.245.163.56, 20.190.181.23, 13.107.246.63
                                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                          No simulations
                                                                                          No context
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          keyauth.winIJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.1.5
                                                                                          dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.1.5
                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          exe004.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                                                                          • 104.26.0.5
                                                                                          SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.26.0.5
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          NAMECHEAP-NETUSPayment Advice - Advice RefA2dGOv46MCnu -USD Priority payment.exeGet hashmaliciousFormBookBrowse
                                                                                          • 199.193.6.134
                                                                                          MN1qo2qaJmEvXDP.exeGet hashmaliciousFormBookBrowse
                                                                                          • 199.192.23.123
                                                                                          qhjKN40R2Q.lnkGet hashmaliciousUnknownBrowse
                                                                                          • 162.213.251.221
                                                                                          https://www.toomanyfailurescannot.com/9IjIRd3Get hashmaliciousHTMLPhisherBrowse
                                                                                          • 162.0.236.189
                                                                                          Document_PDF.vbsGet hashmaliciousFormBookBrowse
                                                                                          • 198.54.115.214
                                                                                          http://url969.uniteddeleverycompany.com/ls/click?upn=u001.H7qy8CwvNpiem-2Bf7DeMFk7YJf68sOidxEWakApUPIOSZg2OY8dbdpgPNdKDwG5r9FFRxGTcDR4Y40gkedjWn5gmaEy2hdp5PhuemKZpyV0zDF4yZB1nSDE1glVUHkAxvk-2Bay1ScD58FIOgYpgYP6N0ScK3-2BfYjxiyiX8IVVnDpwETyB9eFyZIpVwHB3s73fG91OsUU5I5qElZ5zc-2F019KUvyyM6RxeXMegmcNjDutTA-2FnxufBtCMFX4wRkoDOM-2BzzsCiJIoY1mc9q42wLMHiq-2B4vv2-2FqoR1f2l-2BCmuACM5q-2FNbDZQstkQL5-2FH30fC7m19Rn-2BlXgwexRgjH0XwyNE8I2tRC8iv5uAUiLQk1AD6k0bLjsvdQWk9bfnh9YPL7n6nCIBdvs55pyxgyRAhb2C3g-3D-3DzLOu_oNIH2-2FxJ-2FTe1FaVJ1jWIKVy-2BRH8quBB-2F7-2FAZY1zuBa8sYO3A2kRlNC5SRLFjReRDbNAqQc8ija5eyvb3hMHW2LijdhuT99ojcYbvfeVDR6TjM8Iqq-2F4lpz7WKfkjLfs8kULSyk-2BJ2FHXElRwIq2EjJuur8G9AAw0HjpCQ3JV-2F1d4REvZ-2BdaWGeRZa46RgdqnKhZwT4HPC-2Fcr9dZBwLnURfD1x7OZfW9R3B1ZDWRdH1V-2F-2BR-2FWmM6h4NEHHRb9NNBhFNZPaY6piFBOFNOupA2OrFLOTElocKhsbRyDVGAbiBMte7-2BAjR-2BA2H-2F9CP2UREBvDHXsH-2BmlqvAryDrKjjAy8lTbA9nho9WLS1JKeGns5pAqmjv-2FPH8p3m8V8tFEPj2WLqfG6IzXwKcOMYvSrGYkMWMsBKmgc-2Bt-2BOg9a0jxMR-2BByynWcTgKhB44PNmoRQfd9lvEhtXtJnUleVDwJMZbPw60p1K6oxTexhzM9ScXx7kCprkCgMgcfi8rgis43afOn4xM8YRcMg9tIzu64CU7VuKJ-2BMFN5I78-2B8KPrNOjHK5o6ri9rwGpR8XbmEC-2BUi0PISrd7M-2BHCYWlP2o1TBL2OAmqufIzKPL-2F0NYk7NCFq-2BQEFmracNk-2BqqlMZ00PhqEs2JN98lsOxQ6MUbXZMcj-2FhqVBZVN97wkN60D56kJ-2FOQiaa7gW2IP4afUKBiy9Wl-2B0h0QTfxVEz3DZUlxRmNpooAbQL5Uk9Km4liDjAnP-2F9rKBZSc3OZEf33ZNLDn8jMDI2p9XCpZ-2BdDlLCTUAgCLNK0FE-2BJVvF9LYHxIrcC8tpkLszOdDeZHX2xcWm6Lc3y7tQCdb1uaEkAxyHmalygulTA8ODCE0Qj21BBKduU8fdD8C7u4Nqc-2BpJjM-2FhEfOBaq9vq0rNhSs4OVsJ7hESECV5WQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                          • 198.54.116.132
                                                                                          maybecreatebesthingswithgreatnicewhichgivenbreakingthingstobe.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                                                          • 162.213.249.216
                                                                                          https://www.bing.com/ck/a?!&&p=b3ddcc612c5f63024f18df0521265aa33742187d0b01744f07bf6348af8f753eJmltdHM9MTczMzE4NDAwMA&ptn=3&ver=2&hsh=4&fclid=26e9525e-8a77-6109-2437-46988be9608d&psq=superpitmachinery.com&u=a1aHR0cHM6Ly9zdXBlcnBpdG1hY2hpbmVyeS5jb20v&ntb/#fi-weixiang.ong@falconincorporation.comGet hashmaliciousUnknownBrowse
                                                                                          • 198.54.116.132
                                                                                          https://Lakeheadu.hlov.de/Szii3aFWcmivgihoevuc/trTlqgskL4/K3qRQz5Ggziclxgen/t3JiPvu/Szii3aFWcmivgihoevuc/Advising/YSxMdD/lakeheadu.ca/Szii3aFWcmivgihoevucGet hashmaliciousHTMLPhisherBrowse
                                                                                          • 198.54.115.71
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          3b5074b1b5d032e5620f69f9f700ff0eConfirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          • 198.54.115.125
                                                                                          751ietQPnX.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                          • 198.54.115.125
                                                                                          l92fYljXWF.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                          • 198.54.115.125
                                                                                          qxjDerXRGR.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                          • 198.54.115.125
                                                                                          taCCGTk8n1.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                          • 198.54.115.125
                                                                                          Richiesta di Indagine sulla Violazione del Copyright lnk.lnkGet hashmaliciousUnknownBrowse
                                                                                          • 198.54.115.125
                                                                                          9coWg6ayLz.msiGet hashmaliciousUnknownBrowse
                                                                                          • 198.54.115.125
                                                                                          UFS0yWUTWR.msiGet hashmaliciousUnknownBrowse
                                                                                          • 198.54.115.125
                                                                                          No context
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):1.4165262439006563
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:JDefgVmpm5acZvdzaEzQWpgzuiFvY4lO8qkL:JDefgam5acZvdzaA/gzuiFvY4lO8qk
                                                                                          MD5:2965B7F8EF36D3F322D546688D5C82B1
                                                                                          SHA1:393C0EE5D05AFA36C4B397AE3A2452458160F0F5
                                                                                          SHA-256:98B233779A14D60FB72C39A6A4FF7DD3E2337946CACC47DFF6BFA16BDF1F0A98
                                                                                          SHA-512:3A07EEF43E729DFD5B42A4BC978E80D46F8A49488BABA50551555EBD65261DA49DC04CFEA81504B1E2261B606F42FE846B0AA1B66578EC974A4FDC617DD00ACA
                                                                                          Malicious:true
                                                                                          Reputation:low
                                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.3.5.4.2.9.7.5.2.2.0.1.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.3.5.4.2.9.9.2.2.5.1.3.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.9.f.f.7.9.0.-.2.b.f.f.-.4.d.5.a.-.b.d.4.8.-.1.b.c.c.9.9.a.d.c.b.1.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.0.e.7.b.d.5.e.-.5.9.e.5.-.4.c.f.d.-.9.7.6.c.-.b.a.6.4.8.b.f.7.6.0.8.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.A.c.l.a.t.i.s. .t.o.o.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.c.l.a.t.i.s. .t.o.o.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.0.c.-.0.0.0.1.-.0.0.1.4.-.2.b.a.0.-.f.f.6.3.6.c.4.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.7.4.f.7.6.c.7.c.3.d.5.2.c.b.7.a.3.6.c.5.4.2.4.7.f.4.5.f.3.8.c.0.0.0.0.0.0.0.0.!.0.0.0.0.7.2.0.e.d.e.2.f.5.c.4.f.8.6.6.4.3.6.b.e.8.4.9.9.6.4.2.9.0.4.0.9.1.c.9.7.d.3.a.e.!.A.c.l.a.t.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 16 streams, Wed Dec 11 01:31:38 2024, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):1131836
                                                                                          Entropy (8bit):3.466701443399564
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:CFat6cGv4mMp7o2vbH72IeR85YWcLYjjgPqIitBgR8szZJx3Q316l+G:CO6cGv4To22W5YugqI5R8kZfQ3E
                                                                                          MD5:EA0129580D11AC53CA3047A883251D51
                                                                                          SHA1:DFE2CCC459060930A83827ADA824A7195B26DF18
                                                                                          SHA-256:7423B753D99E59685B295F3697F3A5D75FADE995CDA49B9535F0B77BDACD4765
                                                                                          SHA-512:18EDFB94954545E44BD188FDA542F371B7E44250EF69429586227907199557CA1CC2DEB63A0669A5512137C8D2B816259DE644D157C63B66F76D9076BCE7A725
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:MDMP..a..... .......z.Xg.........................(..........<....4.......F...5......D...............l.......8...........T............f..4............{..........p}..............................................................................eJ.......~......Lw......................T...........l.Xg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):10256
                                                                                          Entropy (8bit):3.7121511399407714
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:R6l7wVeJYoygYe6Y9llvWQgmfZGosxAprp89b1FtZlf0jHm:R6lXJYdgYe6Y/lvZgmfIosl1Ft7fH
                                                                                          MD5:2AA58AFADF8EE368A5D8EB1E1B0182D8
                                                                                          SHA1:F9BB03650B5EA520833B1B67736FA32EC6FD144B
                                                                                          SHA-256:2F737864F3B3CB6C4B4DB1F0FE9D0978B3490989FEA74133EA58DBC0EA62A04C
                                                                                          SHA-512:7EFC32DDE19596ED5D34C8118AC8D592E75992E513C4FEFCBCD95E1ACF15477B54E27B05E517D909B51FDBDA09DD6577230E0D47C7E1F0922F231E2774D9133C
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.8.4.<./.P.i.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4828
                                                                                          Entropy (8bit):4.458691747644802
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwWl8zsBJg771I9xGWpW8VYVPYm8M4J6GEIRFzyq8vNGEIvb7ehed:uIjfTI7GH7VMSJOIHWdIvb7ehed
                                                                                          MD5:91B59BB02B99DC938F86D00EF2C00E16
                                                                                          SHA1:9F40E1C937C4A51CA0A66F960F46441BF9EE011C
                                                                                          SHA-256:5A36A6F2960129F968E35E5AE6EE8A1B98C24816C1FDB79D1D178E2401C55855
                                                                                          SHA-512:14448B66E6D169A1739AF45D6B873DC5C28B5BB86D6B1EDDD13A126FB9D41E0CFDC17D0445FEBB9801FF6777A5C1AD6C3CEDE6C8B7730BE1DF40A53067D85253
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="625954" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                                          Category:dropped
                                                                                          Size (bytes):1835008
                                                                                          Entropy (8bit):4.465663667035671
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:9IXfpi67eLPU9skLmb0b49WSPKaJG8nAgejZMMhA2gX4WABl0uN6dwBCswSbZS:uXD949WlLZMM6YFHs+Z
                                                                                          MD5:D71EDD04C08F4A8AD6A0D8C916C2478E
                                                                                          SHA1:A0F5DD6CB4BB23C97D4498C616CF6ACD6E2C117E
                                                                                          SHA-256:30E5BEE33D47CD2D62C214B272E24D098E6F3828EA66334640E1ECA25D3BFF74
                                                                                          SHA-512:B55BD90A38D58C124FDF1D73960BF011E87AEABD2E4DDB7EA054B3C6E06062520610151C8DB1808C3ECFC25F3116E4421ABF5B86894C4FE01E03B1B3898284F1
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb5.klK................................................................................................................................................................................................................................................................................................................................................_........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Entropy (8bit):7.996625258055951
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:Aclatis tool.exe
                                                                                          File size:8'566'304 bytes
                                                                                          MD5:1f1d045c85370801e98c4e5a05f0a922
                                                                                          SHA1:720ede2f5c4f866436be8499642904091c97d3ae
                                                                                          SHA256:eacbd7f909bc29060a2915065b63543940c4b6a8e84a1bac9b4bf582b4bb6797
                                                                                          SHA512:deb844a389d496614025c10cf4f0822ae9945bd6ad12db4dd93be92a2bc4ceaad4841e5e16d57f544c8eb0c7237e9eb61010035b3e1564b170f234dcea8241f6
                                                                                          SSDEEP:196608:7CNWawNvLSaxmCU8xnbgW31UQ47f9wgIa4z83wZrLkBRA+SJpm:0wJhYAeQ4YYwBOA+SJpm
                                                                                          TLSH:8E8633A2258DCA6AD1AC63FB92FB715023F4D9F39846D30B77010ED568CA6F10D819F9
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-+..........."...0.. h.......... ...@... ....@.. ....................................`................................
                                                                                          Icon Hash:45c88c90ccc4e4e1
                                                                                          Entrypoint:0xc3200a
                                                                                          Entrypoint Section:UPX
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0xE52B2DAB [Fri Nov 2 03:23:23 2091 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:4
                                                                                          OS Version Minor:0
                                                                                          File Version Major:4
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:4
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                          Instruction
                                                                                          jmp dword ptr [00C32000h]
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1a4c3c0x4f
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8160000x18215
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8380000xc.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8320000x8UPX
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x1940000x48
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          +14L0x20000x19015c0x190200e47550495858b0d876627d0d6f23e706False1.0003087414089347data7.9998957138352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          0x1940000x681c2c0x681e007d198a0415b792ee83f14d0124efe48aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          0x8160000x182150x18400d2fb981ee2ed4c46d2ae4692901908e7False0.9692735180412371data7.966047155030723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .Enigma0x8300000xa0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          UPX0x8320000x100x200894c2680e05c629c0acd1d2cdf678ac5False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          XD.C59B50x8340000x4aa0x600c7c91f7a41fa7ed7ad9285f18ba84218False0.4615885416666667data4.7975099182658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .UPX0x8360000x8b0x200c391ba0c64258e9d98fe84a6864df69bFalse0.0390625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x8380000xc0x200e8eff65f50619103e8dfd20176391d19False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\203"0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_ICON0x8161300x16f4bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9990960043391792
                                                                                          RT_GROUP_ICON0x82d07c0x14Targa image data - Map 32 x 28491 x 1 +11.05
                                                                                          RT_VERSION0x82d0900x344data0.423444976076555
                                                                                          RT_MANIFEST0x82d3d40xe41XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.39599890380926284
                                                                                          DLLImport
                                                                                          mscoree.dll_CorExeMain
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 11, 2024 02:31:29.882474899 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:29.882508039 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:29.882577896 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:29.893729925 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:29.893743992 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.432018042 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.432121992 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:31.435233116 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:31.435245037 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.435462952 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.524708033 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:31.534327984 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:31.579344034 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.989324093 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.989382982 CET44349732198.54.115.125192.168.2.4
                                                                                          Dec 11, 2024 02:31:31.989465952 CET49732443192.168.2.4198.54.115.125
                                                                                          Dec 11, 2024 02:31:31.996965885 CET49732443192.168.2.4198.54.115.125
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 11, 2024 02:31:26.698633909 CET5347953192.168.2.41.1.1.1
                                                                                          Dec 11, 2024 02:31:26.845523119 CET53534791.1.1.1192.168.2.4
                                                                                          Dec 11, 2024 02:31:29.643915892 CET6221253192.168.2.41.1.1.1
                                                                                          Dec 11, 2024 02:31:29.861053944 CET53622121.1.1.1192.168.2.4
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Dec 11, 2024 02:31:26.698633909 CET192.168.2.41.1.1.10xd871Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                                                          Dec 11, 2024 02:31:29.643915892 CET192.168.2.41.1.1.10x123eStandard query (0)api.dmralawm.comA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Dec 11, 2024 02:31:26.845523119 CET1.1.1.1192.168.2.40xd871No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                                                          Dec 11, 2024 02:31:26.845523119 CET1.1.1.1192.168.2.40xd871No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                                                          Dec 11, 2024 02:31:26.845523119 CET1.1.1.1192.168.2.40xd871No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                                                          Dec 11, 2024 02:31:29.861053944 CET1.1.1.1192.168.2.40x123eNo error (0)api.dmralawm.com198.54.115.125A (IP address)IN (0x0001)false
                                                                                          • api.dmralawm.com
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.449732198.54.115.1254433084C:\Users\user\Desktop\Aclatis tool.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-12-11 01:31:31 UTC135OUTGET /icloud/version_check/aclatis_tool.php HTTP/1.1
                                                                                          Host: api.dmralawm.com
                                                                                          Accept-Encoding: gzip, deflate
                                                                                          Connection: Keep-Alive
                                                                                          2024-12-11 01:31:31 UTC242INHTTP/1.1 200 OK
                                                                                          keep-alive: timeout=5, max=100
                                                                                          x-powered-by: PHP/7.2.34
                                                                                          content-type: text/html; charset=UTF-8
                                                                                          content-length: 3
                                                                                          date: Wed, 11 Dec 2024 01:31:31 GMT
                                                                                          server: LiteSpeed
                                                                                          x-turbo-charged-by: LiteSpeed
                                                                                          connection: close
                                                                                          2024-12-11 01:31:31 UTC3INData Raw: 31 2e 34
                                                                                          Data Ascii: 1.4


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:20:31:24
                                                                                          Start date:10/12/2024
                                                                                          Path:C:\Users\user\Desktop\Aclatis tool.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Users\user\Desktop\Aclatis tool.exe"
                                                                                          Imagebase:0x12be7390000
                                                                                          File size:8'566'304 bytes
                                                                                          MD5 hash:1F1D045C85370801E98C4E5A05F0A922
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2376605761.0000012B80001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2401147676.0000012BEAA70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2394841899.0000012BEA190000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1680525496.0000012BE7524000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:4
                                                                                          Start time:20:31:37
                                                                                          Start date:10/12/2024
                                                                                          Path:C:\Windows\System32\WerFault.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 3084 -s 5608
                                                                                          Imagebase:0x7ff693f00000
                                                                                          File size:570'736 bytes
                                                                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Reset < >

                                                                                            Execution Graph

                                                                                            Execution Coverage:13.9%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:40%
                                                                                            Total number of Nodes:15
                                                                                            Total number of Limit Nodes:0
                                                                                            execution_graph 10176 7ffd9b886b21 10178 7ffd9b886b3f GetFileAttributesW 10176->10178 10179 7ffd9b886c2d 10178->10179 10168 7ffd9b88f38d 10169 7ffd9b88f39f NtQueryInformationProcess 10168->10169 10171 7ffd9b88f4db 10169->10171 10180 7ffd9b8961a1 10181 7ffd9b8961f2 CloseHandle 10180->10181 10183 7ffd9b896285 10181->10183 10172 7ffd9b882c35 10173 7ffd9b882c3f VirtualProtect 10172->10173 10175 7ffd9b882da9 10173->10175 10188 7ffd9b89d4d3 10189 7ffd9b89d4dd CheckRemoteDebuggerPresent 10188->10189 10191 7ffd9b89d84b 10189->10191

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1678 7ffd9b89d415-7ffd9b89d422 1679 7ffd9b89d471-7ffd9b89d5ca 1678->1679 1680 7ffd9b89d424-7ffd9b89d46f 1678->1680 1704 7ffd9b89d5cb-7ffd9b89d5d2 1679->1704 1680->1679 1706 7ffd9b89d5d4-7ffd9b89d619 1704->1706 1713 7ffd9b89d61b-7ffd9b89d629 1706->1713 1714 7ffd9b89d62d-7ffd9b89d632 1706->1714 1715 7ffd9b89d62b 1713->1715 1714->1715 1716 7ffd9b89d634-7ffd9b89d639 1714->1716 1715->1714 1720 7ffd9b89d63b-7ffd9b89d642 1716->1720 1722 7ffd9b89d644-7ffd9b89d669 1720->1722 1726 7ffd9b89d66b-7ffd9b89d699 1722->1726 1730 7ffd9b89d69b-7ffd9b89d6a2 1726->1730 1731 7ffd9b89d6b0 1726->1731 1735 7ffd9b89d6a4 1730->1735 1732 7ffd9b89d6b1-7ffd9b89d6b4 1731->1732 1732->1726 1734 7ffd9b89d6b6-7ffd9b89d6ba 1732->1734 1736 7ffd9b89d6bb-7ffd9b89d6c2 1734->1736 1737 7ffd9b89d6a5-7ffd9b89d6ac 1735->1737 1740 7ffd9b89d6c4-7ffd9b89d6c9 1736->1740 1741 7ffd9b89d6ae-7ffd9b89d6af 1737->1741 1743 7ffd9b89d6cb-7ffd9b89d6d2 1740->1743 1744 7ffd9b89d6e2-7ffd9b89d6f9 1740->1744 1741->1731 1741->1732 1747 7ffd9b89d6d4-7ffd9b89d6df 1743->1747 1751 7ffd9b89d6fb-7ffd9b89d704 1744->1751 1752 7ffd9b89d714-7ffd9b89d734 1744->1752 1747->1744 1757 7ffd9b89d705-7ffd9b89d70c 1751->1757 1758 7ffd9b89d735-7ffd9b89d73c 1752->1758 1761 7ffd9b89d70e-7ffd9b89d711 1757->1761 1758->1758 1760 7ffd9b89d73e-7ffd9b89d849 CheckRemoteDebuggerPresent 1758->1760 1767 7ffd9b89d84b 1760->1767 1768 7ffd9b89d851-7ffd9b89d8b1 1760->1768 1761->1752 1767->1768
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 52a42e736805c712ce91defb31f715d834457638eda07f94c429ddce57e1ba48
                                                                                            • Instruction ID: 6e583fe28251dfafe0f3ad3e924adbaccba7b9bbaa5845c0ef9ac457d128a2ac
                                                                                            • Opcode Fuzzy Hash: 52a42e736805c712ce91defb31f715d834457638eda07f94c429ddce57e1ba48
                                                                                            • Instruction Fuzzy Hash: 78F17F62E0F6C99FEB15DBA898655ECBFB0FF56310F0841BBC098870E3DA25A545C784

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1770 7ffd9b89d430-7ffd9b89d5ca 1796 7ffd9b89d5cb-7ffd9b89d5d2 1770->1796 1798 7ffd9b89d5d4-7ffd9b89d619 1796->1798 1805 7ffd9b89d61b-7ffd9b89d629 1798->1805 1806 7ffd9b89d62d-7ffd9b89d632 1798->1806 1807 7ffd9b89d62b 1805->1807 1806->1807 1808 7ffd9b89d634-7ffd9b89d639 1806->1808 1807->1806 1812 7ffd9b89d63b-7ffd9b89d642 1808->1812 1814 7ffd9b89d644-7ffd9b89d669 1812->1814 1818 7ffd9b89d66b-7ffd9b89d699 1814->1818 1822 7ffd9b89d69b-7ffd9b89d6a2 1818->1822 1823 7ffd9b89d6b0 1818->1823 1827 7ffd9b89d6a4 1822->1827 1824 7ffd9b89d6b1-7ffd9b89d6b4 1823->1824 1824->1818 1826 7ffd9b89d6b6-7ffd9b89d6ba 1824->1826 1828 7ffd9b89d6bb-7ffd9b89d6c2 1826->1828 1829 7ffd9b89d6a5-7ffd9b89d6ac 1827->1829 1832 7ffd9b89d6c4-7ffd9b89d6c9 1828->1832 1833 7ffd9b89d6ae-7ffd9b89d6af 1829->1833 1835 7ffd9b89d6cb-7ffd9b89d6d2 1832->1835 1836 7ffd9b89d6e2-7ffd9b89d6f9 1832->1836 1833->1823 1833->1824 1839 7ffd9b89d6d4-7ffd9b89d6df 1835->1839 1843 7ffd9b89d6fb-7ffd9b89d704 1836->1843 1844 7ffd9b89d714-7ffd9b89d734 1836->1844 1839->1836 1849 7ffd9b89d705-7ffd9b89d70c 1843->1849 1850 7ffd9b89d735-7ffd9b89d73c 1844->1850 1853 7ffd9b89d70e-7ffd9b89d711 1849->1853 1850->1850 1852 7ffd9b89d73e-7ffd9b89d849 CheckRemoteDebuggerPresent 1850->1852 1859 7ffd9b89d84b 1852->1859 1860 7ffd9b89d851-7ffd9b89d8b1 1852->1860 1853->1844 1859->1860
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9a62064437546f33fc1ac3dc700e939cf116d09dd5f61d04d43d13d6299632d5
                                                                                            • Instruction ID: b14844749b829f0a75a83e73adfa3a099b66f68c3fed3a39ee3492f49688d8fd
                                                                                            • Opcode Fuzzy Hash: 9a62064437546f33fc1ac3dc700e939cf116d09dd5f61d04d43d13d6299632d5
                                                                                            • Instruction Fuzzy Hash: 42E19062E0F6CA9FEB15DBA898655E8BFB0FF56310F0841BBC09C870D3DA25A545C784

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1862 7ffd9b89d4d3-7ffd9b89d5ca 1884 7ffd9b89d5cb-7ffd9b89d5d2 1862->1884 1886 7ffd9b89d5d4-7ffd9b89d619 1884->1886 1893 7ffd9b89d61b-7ffd9b89d629 1886->1893 1894 7ffd9b89d62d-7ffd9b89d632 1886->1894 1895 7ffd9b89d62b 1893->1895 1894->1895 1896 7ffd9b89d634-7ffd9b89d639 1894->1896 1895->1894 1900 7ffd9b89d63b-7ffd9b89d642 1896->1900 1902 7ffd9b89d644-7ffd9b89d669 1900->1902 1906 7ffd9b89d66b-7ffd9b89d699 1902->1906 1910 7ffd9b89d69b-7ffd9b89d6a2 1906->1910 1911 7ffd9b89d6b0 1906->1911 1915 7ffd9b89d6a4 1910->1915 1912 7ffd9b89d6b1-7ffd9b89d6b4 1911->1912 1912->1906 1914 7ffd9b89d6b6-7ffd9b89d6ba 1912->1914 1916 7ffd9b89d6bb-7ffd9b89d6c2 1914->1916 1917 7ffd9b89d6a5-7ffd9b89d6ac 1915->1917 1920 7ffd9b89d6c4-7ffd9b89d6c9 1916->1920 1921 7ffd9b89d6ae-7ffd9b89d6af 1917->1921 1923 7ffd9b89d6cb-7ffd9b89d6d2 1920->1923 1924 7ffd9b89d6e2-7ffd9b89d6f9 1920->1924 1921->1911 1921->1912 1927 7ffd9b89d6d4-7ffd9b89d6df 1923->1927 1931 7ffd9b89d6fb-7ffd9b89d704 1924->1931 1932 7ffd9b89d714-7ffd9b89d734 1924->1932 1927->1924 1937 7ffd9b89d705-7ffd9b89d70c 1931->1937 1938 7ffd9b89d735-7ffd9b89d73c 1932->1938 1941 7ffd9b89d70e-7ffd9b89d711 1937->1941 1938->1938 1940 7ffd9b89d73e-7ffd9b89d849 CheckRemoteDebuggerPresent 1938->1940 1947 7ffd9b89d84b 1940->1947 1948 7ffd9b89d851-7ffd9b89d8b1 1940->1948 1941->1932 1947->1948
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: CheckDebuggerPresentRemote
                                                                                            • String ID:
                                                                                            • API String ID: 3662101638-0
                                                                                            • Opcode ID: 1af3253d53db45d04db646e777e336467cf331c398f5bc29e30804cbb4e98251
                                                                                            • Instruction ID: 38500d8e37cf4b3994fa0b0ebfe05864fec0966667693597b19cb8329f668413
                                                                                            • Opcode Fuzzy Hash: 1af3253d53db45d04db646e777e336467cf331c398f5bc29e30804cbb4e98251
                                                                                            • Instruction Fuzzy Hash: 08E1A162E0E69A9FEB159BA89C255ECBFB0FF16314F0841BBC09C870D3DE15A545C784

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1950 7ffd9b89b461-7ffd9b89b4fb call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b884728 1958 7ffd9b89b6d9-7ffd9b89b6fc call 7ffd9b881088 1950->1958 1959 7ffd9b89b501-7ffd9b89b6d8 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b881078 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b88eaa0 call 7ffd9b881088 1950->1959 1964 7ffd9b89cff5-7ffd9b89cfff 1958->1964 1959->1958 1966 7ffd9b89d005-7ffd9b89d015 call 7ffd9b881088 1964->1966 1967 7ffd9b89b701-7ffd9b89b70c 1964->1967 1978 7ffd9b89d020-7ffd9b89d041 call 7ffd9b881088 1966->1978 1969 7ffd9b89b70e 1967->1969 1970 7ffd9b89b713-7ffd9b89b768 call 7ffd9b881088 * 2 1967->1970 1969->1970 1983 7ffd9b89b859-7ffd9b89b869 1970->1983 1986 7ffd9b89b76d-7ffd9b89b77e 1983->1986 1987 7ffd9b89b86f-7ffd9b89b87f 1983->1987 1990 7ffd9b89b785-7ffd9b89b808 call 7ffd9b88e9e0 1986->1990 1991 7ffd9b89b780 1986->1991 1992 7ffd9b89b888-7ffd9b89b8e9 call 7ffd9b88e9e0 call 7ffd9b881088 1987->1992 1993 7ffd9b89b881-7ffd9b89b883 1987->1993 2017 7ffd9b89b82a-7ffd9b89b853 call 7ffd9b881088 1990->2017 2018 7ffd9b89b80a-7ffd9b89b828 call 7ffd9b881088 1990->2018 1991->1990 2011 7ffd9b89cfb6-7ffd9b89cfc6 1992->2011 1995 7ffd9b89cfcd-7ffd9b89cff2 call 7ffd9b881088 1993->1995 1995->1964 2015 7ffd9b89cfcc 2011->2015 2016 7ffd9b89b8ee-7ffd9b89b8ff 2011->2016 2015->1995 2019 7ffd9b89b906-7ffd9b89ba50 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b88e9f0 call 7ffd9b88eab0 call 7ffd9b88e9e0 2016->2019 2020 7ffd9b89b901 2016->2020 2017->1983 2018->1987 2058 7ffd9b89baaf-7ffd9b89bab9 call 7ffd9b881088 2019->2058 2059 7ffd9b89ba52-7ffd9b89baad call 7ffd9b881088 2019->2059 2020->2019 2064 7ffd9b89babf-7ffd9b89bad0 2058->2064 2059->2064 2066 7ffd9b89bad6-7ffd9b89baeb call 7ffd9b88eac0 2064->2066 2067 7ffd9b89bcb4-7ffd9b89bcbe call 7ffd9b881088 2064->2067 2066->2067 2072 7ffd9b89baf1-7ffd9b89bb71 call 7ffd9b881088 call 7ffd9b8849f0 2066->2072 2073 7ffd9b89bcc4-7ffd9b89bcda 2067->2073 2072->2067 2090 7ffd9b89bb77-7ffd9b89bbf7 call 7ffd9b881088 call 7ffd9b8849f0 2072->2090 2074 7ffd9b89cf87-7ffd9b89cfb0 call 7ffd9b881088 2073->2074 2075 7ffd9b89bce0-7ffd9b89bd7c call 7ffd9b882890 call 7ffd9b881088 call 7ffd9b8849f0 2073->2075 2074->2011 2093 7ffd9b89c1c8-7ffd9b89c2da call 7ffd9b881088 * 2 call 7ffd9b881048 call 7ffd9b881088 2075->2093 2094 7ffd9b89bd82-7ffd9b89bdfd call 7ffd9b881088 call 7ffd9b8849f0 2075->2094 2090->2067 2115 7ffd9b89bbfd-7ffd9b89bc06 call 7ffd9b88ead0 2090->2115 2173 7ffd9b89c2dc 2093->2173 2174 7ffd9b89c2e1-7ffd9b89c3ee call 7ffd9b88eae0 call 7ffd9b88eaf0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b88eb00 call 7ffd9b881030 2093->2174 2109 7ffd9b89bedf-7ffd9b89c180 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b881078 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b8811e0 call 7ffd9b881088 call 7ffd9b8849f0 2094->2109 2110 7ffd9b89be03-7ffd9b89be81 call 7ffd9b881088 call 7ffd9b8849f0 2094->2110 2241 7ffd9b89c18b-7ffd9b89c1bf call 7ffd9b882890 call 7ffd9b8811e0 2109->2241 2242 7ffd9b89c182-7ffd9b89c189 call 7ffd9b881060 2109->2242 2134 7ffd9b89be8c-7ffd9b89bed7 call 7ffd9b8811e0 call 7ffd9b882890 call 7ffd9b8811e0 2110->2134 2135 7ffd9b89be83-7ffd9b89be8a call 7ffd9b881060 2110->2135 2122 7ffd9b89bc0b-7ffd9b89bc2e 2115->2122 2128 7ffd9b89bc96-7ffd9b89bca0 call 7ffd9b881088 2122->2128 2129 7ffd9b89bc30-7ffd9b89bc94 call 7ffd9b88ead0 call 7ffd9b881088 2122->2129 2146 7ffd9b89bca6-7ffd9b89bcb2 2128->2146 2129->2146 2150 7ffd9b89bed8-7ffd9b89beda 2134->2150 2135->2150 2146->2073 2153 7ffd9b89c1c1-7ffd9b89c1c3 2150->2153 2173->2174 2203 7ffd9b89c3f4-7ffd9b89cb42 call 7ffd9b881088 * 5 call 7ffd9b8849f0 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b881040 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b88e9e0 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b88e9e0 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b881088 * 2 call 7ffd9b8849f0 call 7ffd9b881038 call 7ffd9b881028 2174->2203 2204 7ffd9b89cb43-7ffd9b89cbbd call 7ffd9b881088 call 7ffd9b8849f0 2174->2204 2203->2204 2222 7ffd9b89cc9f-7ffd9b89cf40 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b881078 call 7ffd9b881088 * 3 call 7ffd9b8849f0 call 7ffd9b881088 call 7ffd9b8849f0 call 7ffd9b8811e0 call 7ffd9b881088 call 7ffd9b8849f0 2204->2222 2223 7ffd9b89cbc3-7ffd9b89cc41 call 7ffd9b881088 call 7ffd9b8849f0 2204->2223 2336 7ffd9b89cf4b-7ffd9b89cf86 call 7ffd9b882890 call 7ffd9b8811e0 2222->2336 2337 7ffd9b89cf42-7ffd9b89cf49 call 7ffd9b881060 2222->2337 2251 7ffd9b89cc4c-7ffd9b89cc97 call 7ffd9b8811e0 call 7ffd9b882890 call 7ffd9b8811e0 2223->2251 2252 7ffd9b89cc43-7ffd9b89cc4a call 7ffd9b881060 2223->2252 2256 7ffd9b89c1c0 2241->2256 2242->2256 2263 7ffd9b89cc98-7ffd9b89cc9a 2251->2263 2252->2263 2256->2153 2336->2074
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 27dfb18f19080dd9eccbc9c0156b0fe9ff8e3e79d3d7524a441f897e06f66cc5
                                                                                            • Instruction ID: 9f5a39d4760644ea33e4f6c1ff2d96e316df4f6f3e4be8423be6ba26d77f49df
                                                                                            • Opcode Fuzzy Hash: 27dfb18f19080dd9eccbc9c0156b0fe9ff8e3e79d3d7524a441f897e06f66cc5
                                                                                            • Instruction Fuzzy Hash: 1D03A670E09A2D8FDB64EB68C8656E8B7B1EF59301F5041EAD01DE72A1CE356E81CF41

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2450 7ffd9b88f38d-7ffd9b88f4d9 NtQueryInformationProcess 2454 7ffd9b88f4db 2450->2454 2455 7ffd9b88f4e1-7ffd9b88f52d 2450->2455 2454->2455
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: InformationProcessQuery
                                                                                            • String ID:
                                                                                            • API String ID: 1778838933-0
                                                                                            • Opcode ID: 36f9b749ca79564ef354364008c082761c9ba85294afc15fcb2d62522a9901bb
                                                                                            • Instruction ID: 49782253814307b31189280c97fd28bd72e3affb0ab634888c117afc407006d0
                                                                                            • Opcode Fuzzy Hash: 36f9b749ca79564ef354364008c082761c9ba85294afc15fcb2d62522a9901bb
                                                                                            • Instruction Fuzzy Hash: 05510270A08A1C8FDBA8DF58D895BE9BBF1FB69310F1051AED44DE3251DA30A985CF44

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2803 7ffd9b88bd1a-7ffd9b88bd27 2804 7ffd9b88bd29-7ffd9b88bd31 2803->2804 2805 7ffd9b88bd32-7ffd9b88be29 2803->2805 2804->2805 2809 7ffd9b88bec7-7ffd9b88bedb 2805->2809 2810 7ffd9b88be2f-7ffd9b88be4b 2805->2810 2811 7ffd9b88bee1-7ffd9b88bf29 2809->2811 2810->2809 2814 7ffd9b88be4d-7ffd9b88be62 2810->2814 2815 7ffd9b88bf2f-7ffd9b88bf4b 2811->2815 2816 7ffd9b88bfc4-7ffd9b88bfd5 2811->2816 2820 7ffd9b88be9b-7ffd9b88bec5 2814->2820 2821 7ffd9b88be64-7ffd9b88be76 2814->2821 2815->2816 2823 7ffd9b88bf4d-7ffd9b88bf62 2815->2823 2818 7ffd9b88bfdb-7ffd9b88c01b 2816->2818 2828 7ffd9b88c01d-7ffd9b88c080 2818->2828 2829 7ffd9b88c081-7ffd9b88c11b 2818->2829 2820->2811 2824 7ffd9b88be78 2821->2824 2825 7ffd9b88be7a-7ffd9b88be8d 2821->2825 2832 7ffd9b88bf9b-7ffd9b88bfc2 2823->2832 2833 7ffd9b88bf64-7ffd9b88bf76 2823->2833 2824->2825 2825->2825 2827 7ffd9b88be8f-7ffd9b88be97 2825->2827 2827->2820 2828->2829 2841 7ffd9b88c1b0-7ffd9b88c1be 2829->2841 2842 7ffd9b88c121-7ffd9b88c13a 2829->2842 2832->2818 2835 7ffd9b88bf78 2833->2835 2836 7ffd9b88bf7a-7ffd9b88bf8d 2833->2836 2835->2836 2836->2836 2838 7ffd9b88bf8f-7ffd9b88bf97 2836->2838 2838->2832 2843 7ffd9b88c1c4-7ffd9b88c216 2841->2843 2842->2841 2845 7ffd9b88c13c-7ffd9b88c14e 2842->2845 2847 7ffd9b88c2ab-7ffd9b88c2b9 2843->2847 2848 7ffd9b88c21c-7ffd9b88c235 2843->2848 2851 7ffd9b88c187-7ffd9b88c1ae 2845->2851 2852 7ffd9b88c150-7ffd9b88c162 2845->2852 2850 7ffd9b88c2bf-7ffd9b88c38f 2847->2850 2848->2847 2854 7ffd9b88c237-7ffd9b88c249 2848->2854 2865 7ffd9b88c397-7ffd9b88c3a9 2850->2865 2851->2843 2855 7ffd9b88c166-7ffd9b88c179 2852->2855 2856 7ffd9b88c164 2852->2856 2861 7ffd9b88c24b-7ffd9b88c25d 2854->2861 2862 7ffd9b88c282-7ffd9b88c2a9 2854->2862 2855->2855 2858 7ffd9b88c17b-7ffd9b88c183 2855->2858 2856->2855 2858->2851 2863 7ffd9b88c25f 2861->2863 2864 7ffd9b88c261-7ffd9b88c274 2861->2864 2862->2850 2863->2864 2864->2864 2868 7ffd9b88c276-7ffd9b88c27e 2864->2868 2866 7ffd9b88c3ab 2865->2866 2867 7ffd9b88c3b1-7ffd9b88c49f call 7ffd9b88c4bb 2865->2867 2866->2867 2878 7ffd9b88c4a6-7ffd9b88c4ba 2867->2878 2879 7ffd9b88c4a1 2867->2879 2868->2862 2879->2878
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a2e37949ef5e049669bd3844f088da6b9cc98bb49d900f9fee9e29fb9e21e0ec
                                                                                            • Instruction ID: 2c9588f20ef4b585f7cd880c3839f9c662970f3721f8abd8d2a727f1ac9464b4
                                                                                            • Opcode Fuzzy Hash: a2e37949ef5e049669bd3844f088da6b9cc98bb49d900f9fee9e29fb9e21e0ec
                                                                                            • Instruction Fuzzy Hash: F3325F70A09A8D8FDBB8DF18C869BE937E1FF59301F00416AD85ECB2A1DB745680CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 07a3fe1c039b2d324a25a14ec225ca33f890ed89397e49d7e3495b3a04a42901
                                                                                            • Instruction ID: 443f25b693a73647040d8f521f45ea92edaac28918033eb350d4c9424739afe9
                                                                                            • Opcode Fuzzy Hash: 07a3fe1c039b2d324a25a14ec225ca33f890ed89397e49d7e3495b3a04a42901
                                                                                            • Instruction Fuzzy Hash: B8323B70A19A8D8FDBB8EF18C865BE937E1FB58311F10416ED85DCB2A1DB749640CB41

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2437 7ffd9b882c35-7ffd9b882da7 VirtualProtect 2447 7ffd9b882daf-7ffd9b882dfd 2437->2447 2448 7ffd9b882da9 2437->2448 2448->2447
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProtectVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 544645111-0
                                                                                            • Opcode ID: 4efa1611c9878029f663a906d2b4c14b7e1b014e607b9eb3e9b85704824a0e70
                                                                                            • Instruction ID: 54e3c1c7083b75672eeb36e8d3d1f15eb1a52207f9decfc1ad7493b4005f5bd3
                                                                                            • Opcode Fuzzy Hash: 4efa1611c9878029f663a906d2b4c14b7e1b014e607b9eb3e9b85704824a0e70
                                                                                            • Instruction Fuzzy Hash: CE619070908B4D8FDB54EF98C895AEDBBF1FF6A310F1141AAC449D7292DA30A985CB41

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2457 7ffd9b891358-7ffd9b891477 VirtualProtect 2461 7ffd9b891479 2457->2461 2462 7ffd9b89147f-7ffd9b8914cd 2457->2462 2461->2462
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProtectVirtual
                                                                                            • String ID:
                                                                                            • API String ID: 544645111-0
                                                                                            • Opcode ID: e40016990bd0e4a69791ab2b7eac49f9ed58a89dfa291488f9fc8984c40a0d7d
                                                                                            • Instruction ID: 6a3891812d9943d1c0ead3d3eac1c1ca0f07e79c07ddff3e89d543ef12674899
                                                                                            • Opcode Fuzzy Hash: e40016990bd0e4a69791ab2b7eac49f9ed58a89dfa291488f9fc8984c40a0d7d
                                                                                            • Instruction Fuzzy Hash: 44512670918B1C8FDB58DF98C885AEDBBF1FB69314F10426ED44AE3251DB70A981CB81

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2464 7ffd9b882895-7ffd9b886bb7 2469 7ffd9b886bd3-7ffd9b886c2b GetFileAttributesW 2464->2469 2470 7ffd9b886bb9-7ffd9b886bd0 2464->2470 2471 7ffd9b886c33-7ffd9b886c7d 2469->2471 2472 7ffd9b886c2d 2469->2472 2470->2469 2472->2471
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cda02fe2d14dc6c726e2e810e77de499de0f68880143493ead0e6fc53a1ee03d
                                                                                            • Instruction ID: 28dd356d7f4521fb2729b461482f095b0b690f216b8684099aa5dadfe7156300
                                                                                            • Opcode Fuzzy Hash: cda02fe2d14dc6c726e2e810e77de499de0f68880143493ead0e6fc53a1ee03d
                                                                                            • Instruction Fuzzy Hash: 7E513B70E08A5C8FEB58DF98D859BADBBF1FB59310F10416ED009E7252DB74A946CB40

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2475 7ffd9b886b21-7ffd9b886bb7 2479 7ffd9b886bd3-7ffd9b886c2b GetFileAttributesW 2475->2479 2480 7ffd9b886bb9-7ffd9b886bd0 2475->2480 2481 7ffd9b886c33-7ffd9b886c7d 2479->2481 2482 7ffd9b886c2d 2479->2482 2480->2479 2482->2481
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesFile
                                                                                            • String ID:
                                                                                            • API String ID: 3188754299-0
                                                                                            • Opcode ID: 851241d52af29297a7dd2e46a9d4c4fadd90472d768cabae9942ebbc61326817
                                                                                            • Instruction ID: 18a696b84004f550312e45737ec61cee5fd1dd32a42186611e2dd360812e70c3
                                                                                            • Opcode Fuzzy Hash: 851241d52af29297a7dd2e46a9d4c4fadd90472d768cabae9942ebbc61326817
                                                                                            • Instruction Fuzzy Hash: 2D515C70908A4C8FDB58DFA8D858BEDBBF1FB5A310F10416ED049E7262DB749845CB00

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2797 7ffd9b8961a1-7ffd9b896283 CloseHandle 2800 7ffd9b896285 2797->2800 2801 7ffd9b89628b-7ffd9b8962c9 2797->2801 2800->2801
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseHandle
                                                                                            • String ID:
                                                                                            • API String ID: 2962429428-0
                                                                                            • Opcode ID: 97fca0c8921103800e9b6421f7ae500ad29e5ab6d52f6134af7abea3770ef703
                                                                                            • Instruction ID: 225e891f6062a0b6a78176fadf06e6d75f1d3da2f337d7b0f94c2459c12f2cd6
                                                                                            • Opcode Fuzzy Hash: 97fca0c8921103800e9b6421f7ae500ad29e5ab6d52f6134af7abea3770ef703
                                                                                            • Instruction Fuzzy Hash: 2E412970A0864C8FDB98DF98D895BEDBBF0FB5A310F1041AED04DE7252DA70A846CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 49381e9d1588c4fc39eba108b38e8494a302c339930162aeeafe551611c39ba7
                                                                                            • Instruction ID: 1b65c8c399155856733e574b706769832e877ec7d515437332b0f99296f97462
                                                                                            • Opcode Fuzzy Hash: 49381e9d1588c4fc39eba108b38e8494a302c339930162aeeafe551611c39ba7
                                                                                            • Instruction Fuzzy Hash: CF512D70F0951E8FDB68EFA4C8649A9B7B1FF49300F1045EAD01EA7695CA356E80CF61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 578352006359c9d1b12090002c2822acf80de42c4cef638ae9a3bd5782abb230
                                                                                            • Instruction ID: 1d6ed4c5706b00fae76de2fcbcf978dc5e8aeb3b8f1b237f7f51a47b79caf2a2
                                                                                            • Opcode Fuzzy Hash: 578352006359c9d1b12090002c2822acf80de42c4cef638ae9a3bd5782abb230
                                                                                            • Instruction Fuzzy Hash: D751FC74E0A2598FEB69EF54C8696A9B7F1FF48300F1585EAD01DA7291CF346A80CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8e4266f69f7862cb25a047c437af98405050fb1a807f73a161a14119bc8abb37
                                                                                            • Instruction ID: 75602b2cd89948c52d05562a536286471157314d44f5dab4a6fc909b5a724b4c
                                                                                            • Opcode Fuzzy Hash: 8e4266f69f7862cb25a047c437af98405050fb1a807f73a161a14119bc8abb37
                                                                                            • Instruction Fuzzy Hash: 06415F70E0961D8FDB64EFA8C8646A9B7B1FF99300F0045EAD01EA7695CB346A80CF15
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 93bd3fe7af5c9e990a1d16cba1c9bb73287f9f2f644fc06e62b2265ccc949b1c
                                                                                            • Instruction ID: d0c7c58c397275c088ea30a4322242d2a782eaca17221f3c7a3779c06df27c4d
                                                                                            • Opcode Fuzzy Hash: 93bd3fe7af5c9e990a1d16cba1c9bb73287f9f2f644fc06e62b2265ccc949b1c
                                                                                            • Instruction Fuzzy Hash: 9D415F70E0911D8FDB68EFA4C8646A9B7B1FF59300F1046FAC01DE7695CA346A80CF61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d85387079d514a48799c304a260d0f9d6f68143af3dfb23c5968cff15a4ab2c1
                                                                                            • Instruction ID: 94713c2bcab1fe591ca32e16dd5ecf5aee79cc8bb0a4c98c9f2056236723275a
                                                                                            • Opcode Fuzzy Hash: d85387079d514a48799c304a260d0f9d6f68143af3dfb23c5968cff15a4ab2c1
                                                                                            • Instruction Fuzzy Hash: 2541E970A0951D8FEB68EF54C8649A9B7B2FF58300F0081F9D01DE72A5DA366A91CF40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6411e831015eb72110e21af683f12912745a3d1fff197160aee77d85cfe11883
                                                                                            • Instruction ID: 4ac29cfb2018fc9a2ab6a69ee9f6d03d20df46d62565fc33f9a87dbb6a93fe92
                                                                                            • Opcode Fuzzy Hash: 6411e831015eb72110e21af683f12912745a3d1fff197160aee77d85cfe11883
                                                                                            • Instruction Fuzzy Hash: 9541FB70E15A2D8FDB68EF54CC646AEB7B2FF59302F0045EAD00D972A1DA306A808F54
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 28904f4601ab0ab89ba837bb0eb885e15cf7ef587c7cd352e37426aa6d869aaf
                                                                                            • Instruction ID: d77c4df1837ecd530e9fb69011f3ca497248c09ed23edb57475b5f39a3f2ae2f
                                                                                            • Opcode Fuzzy Hash: 28904f4601ab0ab89ba837bb0eb885e15cf7ef587c7cd352e37426aa6d869aaf
                                                                                            • Instruction Fuzzy Hash: 8F412B70E0551E8FDB68EF54D8A85ADB7B1FF58300F1146FAD01EA72A6DA316A81CF40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3bf8fea35d39fca79a767a391c12b10214c20dc40da667c8a4e497ef7eb64fcf
                                                                                            • Instruction ID: a10be0eab0623873dcd87f77b9b3a36b5046545be6fa24eab09b4ada3e73eb34
                                                                                            • Opcode Fuzzy Hash: 3bf8fea35d39fca79a767a391c12b10214c20dc40da667c8a4e497ef7eb64fcf
                                                                                            • Instruction Fuzzy Hash: 4741F070A1951A8FDB68EF94C4656BDB7B1FF58300F1181FAD00EA7295DE346A81CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d029f297a482bb9c602c68dcd51535f0b0f6e356781477137d0f39df9d7b2525
                                                                                            • Instruction ID: 1c3d1966e6edf3dec7a3144dc014dd9fcd052a742358f64b2678397716b4d642
                                                                                            • Opcode Fuzzy Hash: d029f297a482bb9c602c68dcd51535f0b0f6e356781477137d0f39df9d7b2525
                                                                                            • Instruction Fuzzy Hash: 6841FC70E1965DCFDB68EF64C8656A9B7B1FF58310F0046FAD00EA7291DA386A80CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6779e57d29ccefab63405988402f9d45b4ba30989703221e8c7a2ec128135bca
                                                                                            • Instruction ID: 5ca0ac9e9da2a7e4b554181a7d8d4c3224233dc286ce599085e12770c86022b2
                                                                                            • Opcode Fuzzy Hash: 6779e57d29ccefab63405988402f9d45b4ba30989703221e8c7a2ec128135bca
                                                                                            • Instruction Fuzzy Hash: E5414F70E1915A8FDB64FFA4C8615A9B7B2FF68300F1041FAD01DAB2A2DE756980CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 67411da6f06f8179d249c42831f4fefb195f50cf50f3c1b98a446b5804214d7f
                                                                                            • Instruction ID: 494bf17223fd5e7ed1ba4aca7d069fc634880bc4e089c84c3fd32555153cc77e
                                                                                            • Opcode Fuzzy Hash: 67411da6f06f8179d249c42831f4fefb195f50cf50f3c1b98a446b5804214d7f
                                                                                            • Instruction Fuzzy Hash: FA413070E18A1D8FEB68EF54C8659AEB7B1FF58301F0145F9901DA7296CE346A80CF44
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: de9147b8d32343c63beffc2b6649da043f3e2448037da501fa8b4e0d3153fd9e
                                                                                            • Instruction ID: f7d8820ce7dbe0567b619647f678897cd40bef2affb06ca4e29fec2b216d0b37
                                                                                            • Opcode Fuzzy Hash: de9147b8d32343c63beffc2b6649da043f3e2448037da501fa8b4e0d3153fd9e
                                                                                            • Instruction Fuzzy Hash: 7C41EC70D1855E8FDB68EF94C8616ADB7B1FF58300F1085FAD01EA7296CA346A81CF60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 931775943d89b87e78f89015f65f48c35c7ee7c26e80e0baa7db3696bc3d46dc
                                                                                            • Instruction ID: 99ba31bd8d62dec2a52e5d29421b3c3bc81b9ae11284590360014c077c7c8729
                                                                                            • Opcode Fuzzy Hash: 931775943d89b87e78f89015f65f48c35c7ee7c26e80e0baa7db3696bc3d46dc
                                                                                            • Instruction Fuzzy Hash: 63410D70E1911E8FEB68EF64C865AA9B7B1FF48300F0045FAD01EA7291CE746A81CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 092ed74a7bced5d629a9e54c228472088d606600942d920defc923ae745ae143
                                                                                            • Instruction ID: ea59da6d77a595f998ae036c442da06d059eab663317e49ac36391145925f845
                                                                                            • Opcode Fuzzy Hash: 092ed74a7bced5d629a9e54c228472088d606600942d920defc923ae745ae143
                                                                                            • Instruction Fuzzy Hash: FA410B70E1951D9FDB68EFA8C8656B9B7B1FF58300F1045EBD01EA3291DA346A81CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2413906645.00007FFD9BBB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBB0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9bbb0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 394009c4f1b06dd51333cf4da12e08d2e17bb9c5c66425ff06a0ea7fce78ac4d
                                                                                            • Instruction ID: 84814671a5bd683ea7f4f9bb52b9c376e89849ce6c46e998176ab18e3a6082be
                                                                                            • Opcode Fuzzy Hash: 394009c4f1b06dd51333cf4da12e08d2e17bb9c5c66425ff06a0ea7fce78ac4d
                                                                                            • Instruction Fuzzy Hash: 7B41BE70E4951D8FEB69EF64C865AE9B7B2BF58300F0141E9D01EA7291DE346A81CF44
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2411443025.00007FFD9B9D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9D0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b9d0000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 440861cfbe56d6abc0709905ae764fa93d66c1ff07037ec5a01298918bfc17f9
                                                                                            • Instruction ID: b99b973d98f524cb42c54cf29fb4bc6ff96f1c702758e08b975ee437780973d2
                                                                                            • Opcode Fuzzy Hash: 440861cfbe56d6abc0709905ae764fa93d66c1ff07037ec5a01298918bfc17f9
                                                                                            • Instruction Fuzzy Hash: 6331BB70E0851E8FEB68EB54C865AE9B7B1FF58300F0145FAD51EA7295CE746A80CF60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 322a07ed1330b764d95f82cdac911529d5d3895b6ba2c713f63e9dd5daf8832d
                                                                                            • Instruction ID: de96e2f463d2665d53be250f7d53166b8f8a709a17e3c956f9d81c046de0408f
                                                                                            • Opcode Fuzzy Hash: 322a07ed1330b764d95f82cdac911529d5d3895b6ba2c713f63e9dd5daf8832d
                                                                                            • Instruction Fuzzy Hash: 6C224C70A19A8D8FDBB8EF28C865BE937E1FF59301F00416AD85EC72A1DB756640CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.2409647609.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_7ffd9b880000_Aclatis tool.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 33313def66772aabb6685d3fe3bf5f441e16e11bd1ba6f9be890988eb1b91f3a
                                                                                            • Instruction ID: 647a001b0f254089985c864a37261c2fba8c6e76d17be82f6a6b22ac60a2b642
                                                                                            • Opcode Fuzzy Hash: 33313def66772aabb6685d3fe3bf5f441e16e11bd1ba6f9be890988eb1b91f3a
                                                                                            • Instruction Fuzzy Hash: 9D81097490CA8D8FDBA8DF68C855BE97BE0FF19310F00416AE85DC7291DB74A585CB81