Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
Analysis ID:1543313
MD5:1f16394645feef286d24108fb5154858
SHA1:8d01fd31af2e90dc568435f21b9def36519faa83
SHA256:87d7cba333569ff7e19e283f77dfa1257b71dcf8230fdd6a9af78e10d8269913
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking computer name)
Queries memory information (via WMI often done to detect virtual machines)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Detected potential crypto function
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D17806000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D17802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D17806000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D17802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D17806000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D17802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D17806000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D17802000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D178A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D178A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B600830 GetProcessTimes,GetSystemTimes,GetProcessIoCounters,GetTokenInformation,GetTokenInformation,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,K32GetModuleFileNameExW,ReadProcessMemory,ReadProcessMemory,RtlFreeHeap,RtlFreeHeap,ReadProcessMemory,0_2_00007FF79B600830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FD0C0 NtQuerySystemInformation,RtlFreeHeap,RtlFreeHeap,0_2_00007FF79B5FD0C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B602190 NtQueryInformationProcess,NtQueryInformationProcess,0_2_00007FF79B602190
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6140400_2_00007FF79B614040
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6008300_2_00007FF79B600830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FCC300_2_00007FF79B5FCC30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5E9D100_2_00007FF79B5E9D10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C80E00_2_00007FF79B5C80E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FE4E00_2_00007FF79B5FE4E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6028E00_2_00007FF79B6028E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5CA4E80_2_00007FF79B5CA4E8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C48C00_2_00007FF79B5C48C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FD0C00_2_00007FF79B5FD0C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6038B00_2_00007FF79B6038B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5CC3600_2_00007FF79B5CC360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FDBE00_2_00007FF79B5FDBE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B612BB00_2_00007FF79B612BB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C16800_2_00007FF79B5C1680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5ED6200_2_00007FF79B5ED620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B603EA00_2_00007FF79B603EA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C40800_2_00007FF79B5C4080
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5ED8900_2_00007FF79B5ED890
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B615C700_2_00007FF79B615C70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5EF4400_2_00007FF79B5EF440
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FA0500_2_00007FF79B5FA050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D35000_2_00007FF79B5D3500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C35100_2_00007FF79B5C3510
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5E10E00_2_00007FF79B5E10E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B616CF00_2_00007FF79B616CF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5E8CC00_2_00007FF79B5E8CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5DD8D00_2_00007FF79B5DD8D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D82600_2_00007FF79B5D8260
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D6F600_2_00007FF79B5D6F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5EE3700_2_00007FF79B5EE370
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C33400_2_00007FF79B5C3340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5F97500_2_00007FF79B5F9750
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5F28100_2_00007FF79B5F2810
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5F73E00_2_00007FF79B5F73E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5DD3F00_2_00007FF79B5DD3F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D82600_2_00007FF79B5D8260
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C52800_2_00007FF79B5C5280
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5DA6800_2_00007FF79B5DA680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C3A900_2_00007FF79B5C3A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5E26900_2_00007FF79B5E2690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C7E600_2_00007FF79B5C7E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D82600_2_00007FF79B5D8260
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C4E700_2_00007FF79B5C4E70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FCA400_2_00007FF79B5FCA40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6026400_2_00007FF79B602640
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6157000_2_00007FF79B615700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B6123000_2_00007FF79B612300
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5ECAF00_2_00007FF79B5ECAF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C7AC00_2_00007FF79B5C7AC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5F92D00_2_00007FF79B5F92D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C3AB00_2_00007FF79B5C3AB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C32B00_2_00007FF79B5C32B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5DAD700_2_00007FF79B5DAD70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D2D700_2_00007FF79B5D2D70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5C2D300_2_00007FF79B5C2D30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D19300_2_00007FF79B5D1930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5CA6160_2_00007FF79B5CA616
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5F92100_2_00007FF79B5F9210
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5D39D00_2_00007FF79B5D39D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5FF1D00_2_00007FF79B5FF1D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5DCDB00_2_00007FF79B5DCDB0
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632939512.0000017D175F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628015783.0000017D174F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameApplicationFrameHost.exej% vs SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
Source: classification engineClassification label: mal64.evad.winEXE@1/0@1/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B603EA0 CoCreateInstance,CoSetProxyBlanket,0_2_00007FF79B603EA0
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeReversingLabs: Detection: 47%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: perfos.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeSection loaded: profapi.dllJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic file information: File size 30420480 > 1048576
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1ca8a00
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: section name: .voltbl
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-15905
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PortConnector
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B5E9D10 GetSystemInfo,0_2_00007FF79B5E9D10
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus PipesS
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1750B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17836000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619018701.0000017D16FC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flus
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2605464690.0000017D15622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D1560C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D175DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotj
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1750B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D1750B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition4
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D1781B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2628920702.0000017D171CE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2633927973.0000017D171CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisore
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619393872.0000017D16FC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partitiondn;P
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1750B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D1750B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processorw
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2605435877.0000017D16FAE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2603197388.0000017D16FB1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2606389974.0000017D16FB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HW
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus PipesI
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2620286194.0000017D17033000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2620124309.0000017D17050000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tions/sec9568BranchCache9570Retrieval: Bytes from server9572Retrieval: Bytes from cache9574Retrieval: Bytes served9576Discovery: Weighted average discovery time9578SMB: Bytes from cache9580SMB: Bytes from server9582BITS: Bytes from cache9584BITS: Bytes from server9586WININET: Bytes from cache9588WININET: Bytes from server9590WINHTTP: Bytes from cache9592WINHTTP: Bytes from server9594OTHER: Bytes from cache9596OTHER: Bytes from server9598Discovery: Attempted discoveries9600Local Cache: Cache complete file segments9602Local Cache: Cache partial file segments9604Hosted Cache: Client file segment offers made9606Retrieval: Average branch rate9608Discovery: Successful discoveries9610Hosted Cache: Segment offers queue size9612Publication Cache: Published contents9614Local Cache: Average access time3432WSMan Quota Statistics3434Total Requests/Second3436User Quota Violations/Second3438System Quota Violations/Second3440Active Shells3442Active Operations3444Active Users3446Process ID1914Hyper-V VM Vid Partition1916Physical Pages Allocated1918Preferred NUMA Node Index1920Remote Physical Pages1922ClientHandles1924CompressPackTimeInUs1926CompressUnpackTimeInUs1928CompressPackInputSizeInBytes1930CompressUnpackInputSizeInBytes1932CompressPackOutputSizeInBytes1934CompressUnpackOutputSizeInBytes1936CompressUnpackUncompressedInputSizeInBytes1938CompressPackDiscardedSizeInBytes1940CompressWorkspaceSizeInBytes1942CompressScratchPoolSizeInBytes1944CryptPackTimeInUs1946CryptUnpackTimeInUs1948CryptPackInputSizeInBytes1950CryptUnpackInputSizeInBytes1952CryptPackOutputSizeInBytes1954CryptUnpackOutputSizeInBytes1956CryptScratchPoolSizeInBytes
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2627498811.0000017D17836000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1750B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D1750B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processordll
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partitionl
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processors9
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2605435877.0000017D16FAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root Partition
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V fhcggfswwssneqq Bus
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619393872.0000017D16FC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervis
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical ProcessorC;
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2604119045.0000017D16FF5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2604195617.0000017D16FF5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2605416998.0000017D16FF5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2604363465.0000017D16FF5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619018701.0000017D16FC1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2606024731.0000017D16FF5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619091530.0000017D16FF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition:
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2604859289.0000017D16FAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hyperviso
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2639019408.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2647703909.0000017D155F5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.mui
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2604341657.0000017D16FD7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2603169576.0000017D16FBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2605558473.0000017D16FD7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Inte
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1725B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotj
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V fhcggfswwssneqq Bus Pipes
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partition.dll
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2619091530.0000017D16FF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: or Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions CostomplHH
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D1751A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1751A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D17588000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D155B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D1718B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2644252831.0000017D1750B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000002.2649273952.0000017D1553C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2634737707.0000017D1750B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisorr
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2626571654.0000017D17261000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeNtQueryInformationProcess: Indirect: 0x7FF79B600CD8Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeNtQueryInformationProcess: Indirect: 0x7FF79B600E4CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeNtQueryInformationProcess: Indirect: 0x7FF79B6021BCJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeNtQueryInformationProcess: Indirect: 0x7FF79B602255Jump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D178A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2631683987.0000017D17506000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2641038675.0000017D17506000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2631683987.0000017D17506000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2641038675.0000017D17506000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndg
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeCode function: 0_2_00007FF79B600830 GetProcessTimes,GetSystemTimes,GetProcessIoCounters,GetTokenInformation,GetTokenInformation,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,K32GetModuleFileNameExW,ReadProcessMemory,ReadProcessMemory,RtlFreeHeap,RtlFreeHeap,ReadProcessMemory,0_2_00007FF79B600830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts211
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory211
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS14
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe47%ReversingLabsWin64.Trojan.CrypterX
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://excel.office.com0%URL Reputationsafe
https://outlook.com0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
18.31.95.13.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://excel.office.comSecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D178A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://outlook.comSecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2642080121.0000017D178A4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe, 00000000.00000003.2632926203.0000017D178A8000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1543313
    Start date and time:2024-10-27 16:56:14 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 54s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
    Detection:MAL
    Classification:mal64.evad.winEXE@1/0@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 27
    • Number of non-executed functions: 42
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenKey calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • VT rate limit hit for: SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.99878353165218
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
    File size:30'420'480 bytes
    MD5:1f16394645feef286d24108fb5154858
    SHA1:8d01fd31af2e90dc568435f21b9def36519faa83
    SHA256:87d7cba333569ff7e19e283f77dfa1257b71dcf8230fdd6a9af78e10d8269913
    SHA512:8ea771201abc103fd58ad7e6171acbae87c84159ac2c3bc97cee33a4317cfa365bf600aac43e127b7fd1b20c63ad0efb4661379f5fd54d95e8b33bbbf9738f5a
    SSDEEP:786432:2ppQNNE6PY1TYkBVbFWHNACsbSjvd/TSh:FN5/kfUebal/TS
    TLSH:3A673393F65654CCD0B2E1F842299072F7B1390F237899D71BDAD6713F62A806A3DB24
    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......g.........."......j..........@y.........@..........................................`........................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x140047940
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x671006BA [Wed Oct 16 18:32:26 2024 UTC]
    TLS Callbacks:0x4002ce30, 0x1
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:1d294a89dfa5cccc79f25d6bb7b51ae4
    Instruction
    dec eax
    sub esp, 28h
    call 00007F5FECBD2290h
    dec eax
    add esp, 28h
    jmp 00007F5FECBD1EA7h
    int3
    int3
    dec eax
    sub esp, 28h
    call 00007F5FECBD2044h
    dec eax
    neg eax
    sbb eax, eax
    neg eax
    dec eax
    dec eax
    add esp, 28h
    ret
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    cmp dword ptr [01CBA08Eh], FFFFFFFFh
    dec eax
    mov ebx, ecx
    jne 00007F5FECBD2039h
    call 00007F5FECBD3E05h
    jmp 00007F5FECBD2041h
    dec eax
    mov edx, ebx
    dec eax
    lea ecx, dword ptr [01CBA078h]
    call 00007F5FECBD3D70h
    xor edx, edx
    test eax, eax
    dec eax
    cmove edx, ebx
    dec eax
    mov eax, edx
    dec eax
    add esp, 20h
    pop ebx
    ret
    int3
    int3
    dec eax
    sub esp, 18h
    dec esp
    mov eax, ecx
    mov eax, 00005A4Dh
    cmp word ptr [FFFB8645h], ax
    jne 00007F5FECBD20AAh
    dec eax
    arpl word ptr [FFFB8678h], cx
    dec eax
    lea edx, dword ptr [FFFB8635h]
    dec eax
    add ecx, edx
    cmp dword ptr [ecx], 00004550h
    jne 00007F5FECBD2091h
    mov eax, 0000020Bh
    cmp word ptr [ecx+18h], ax
    jne 00007F5FECBD2086h
    dec esp
    sub eax, edx
    movzx eax, word ptr [ecx+14h]
    dec eax
    lea edx, dword ptr [ecx+18h]
    dec eax
    add edx, eax
    movzx eax, word ptr [ecx+06h]
    dec eax
    lea ecx, dword ptr [eax+eax*4]
    dec esp
    lea ecx, dword ptr [edx+ecx*8]
    dec eax
    mov dword ptr [esp], edx
    dec ecx
    cmp edx, ecx
    je 00007F5FECBD204Ah
    mov ecx, dword ptr [edx+0Ch]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1cfd8500x118.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d030000x1b84.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d090000x71c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1cfd7400x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x1cfafc00x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1cf62f00x138.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1cfded80x570.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x568d60x56a00ceff61a9561e29fede3854d947e451d9False0.5254047168109668data6.4509030241458305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x580000x1ca89940x1ca8a003e17afb1a745e816c6f5646827862f4dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x1d010000x1b900xa00b5787e7dc5b63059d62883281298c92fFalse0.1453125data1.8822288726623897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x1d030000x1b840x1c00e924d556b11f998af4602403332c776bFalse0.5096261160714286data5.761783175655333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .gfids0x1d050000x800x2005dc6133c9100b7f8f6e13185ceaf0194False0.216796875data1.478000326156912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tls0x1d060000x990x200a3fb860dfc543513b2c0894049db9bfbFalse0.037109375data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .voltbl0x1d070000x2a0x200eae09b4822d39f484dfe9175c88bb635False0.107421875data0.7001115316230119
    _RDATA0x1d080000xf40x200037b1d9951c8539e725c4baf787173fcFalse0.31640625data2.451290628504482IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1d090000x71c0x800995e38fee3feea51ed4c7b4498d7b9ccFalse0.55859375data5.206560034662622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    KERNEL32.dllAddVectoredExceptionHandler, CheckRemoteDebuggerPresent, CloseHandle, CompareStringOrdinal, CompareStringW, CreateDirectoryW, CreateFileW, CreateNamedPipeW, CreateProcessW, CreateThread, CreateWaitableTimerExW, DeleteCriticalSection, DeleteProcThreadAttributeList, DuplicateHandle, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExA, FindFirstFileW, FindNextFileA, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetComputerNameExW, GetConsoleCP, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFullPathNameW, GetLastError, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetSystemTimePreciseAsFileTime, GetSystemTimes, GetTickCount64, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeProcThreadAttributeList, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, K32GetPerformanceInfo, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, LocalFree, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadFileEx, ReadProcessMemory, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEnvironmentVariableA, SetFileInformationByHandle, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadExecutionState, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, UpdateProcThreadAttribute, VirtualQueryEx, WaitForSingleObject, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteFileEx
    bcryptprimitives.dllProcessPrng
    api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
    ntdll.dllNtQueryInformationProcess, NtQuerySystemInformation, NtWriteFile, RtlGetVersion, RtlNtStatusToDosError
    ADVAPI32.dllCopySid, GetLengthSid, GetTokenInformation, IsValidSid, OpenProcessToken, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegQueryValueExW, RegSetValueExW, SystemFunction036
    bcrypt.dllBCryptGenRandom
    powrprof.dllCallNtPowerInformation
    ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, PropVariantClear
    shell32.dllCommandLineToArgvW, ShellExecuteExW
    oleaut32.dllGetErrorInfo, SafeArrayAccessData, SafeArrayDestroy, SafeArrayUnaccessData, SysAllocStringLen, SysFreeString, SysStringLen, VariantClear
    psapi.dllGetModuleFileNameExW
    pdh.dllPdhAddEnglishCounterW, PdhCloseQuery, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhOpenQueryA, PdhRemoveCounter
    propsys.dllPropVariantToBSTR, VariantToPropVariant
    TimestampSource PortDest PortSource IPDest IP
    Oct 27, 2024 16:57:56.478554964 CET5350632162.159.36.2192.168.2.5
    Oct 27, 2024 16:57:57.105940104 CET5680953192.168.2.51.1.1.1
    Oct 27, 2024 16:57:57.115781069 CET53568091.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 27, 2024 16:57:57.105940104 CET192.168.2.51.1.1.10xd00fStandard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 27, 2024 16:57:57.115781069 CET1.1.1.1192.168.2.50xd00fName error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:11:57:26
    Start date:27/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.1579.2229.exe"
    Imagebase:0x7ff79b5c0000
    File size:30'420'480 bytes
    MD5 hash:1F16394645FEEF286D24108FB5154858
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:10.4%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:67.4%
      Total number of Nodes:589
      Total number of Limit Nodes:45
      execution_graph 15823 7ff79b5c80e0 15887 7ff79b603160 15823->15887 15825 7ff79b5c811f 15898 7ff79b603430 GlobalMemoryStatusEx 15825->15898 15828 7ff79b5c8191 GetComputerNameExW 15830 7ff79b5c81bd 15828->15830 15833 7ff79b5c81e1 15828->15833 15829 7ff79b5c814b 15829->15828 15838 7ff79b5cab1e 15829->15838 15831 7ff79b5caaff 15830->15831 15830->15833 15832 7ff79b615f40 RtlReAllocateHeap 15831->15832 15832->15838 15834 7ff79b5c8327 15833->15834 15837 7ff79b5c9282 15833->15837 15906 7ff79b603dd0 CoInitializeEx 15834->15906 15840 7ff79b5f21b0 RtlReAllocateHeap 15837->15840 15930 7ff79b5f21b0 15838->15930 15839 7ff79b5c833c 15839->15838 15909 7ff79b603ea0 CoCreateInstance 15839->15909 15885 7ff79b5c93ab 15840->15885 15843 7ff79b5c48c0 4 API calls 15844 7ff79b5ca472 15843->15844 15845 7ff79b603ea0 3 API calls 15868 7ff79b5c8440 15845->15868 15846 7ff79b5cb506 15934 7ff79b5fc880 15846->15934 15848 7ff79b5cad10 15848->15846 15849 7ff79b5f21b0 RtlReAllocateHeap 15848->15849 15851 7ff79b5fc880 4 API calls 15848->15851 15849->15848 15850 7ff79b5cb50b 15851->15848 15852 7ff79b6038b0 SysAllocStringLen 15852->15868 15853 7ff79b603ea0 3 API calls 15854 7ff79b5c95a6 15853->15854 15854->15838 15915 7ff79b5c28b0 15854->15915 15856 7ff79b5c96c7 15856->15838 15857 7ff79b603ea0 3 API calls 15856->15857 15858 7ff79b5c9862 15857->15858 15858->15838 15859 7ff79b5c28b0 2 API calls 15858->15859 15862 7ff79b5c9936 15859->15862 15860 7ff79b5c93c5 15860->15838 15860->15853 15861 7ff79b5c99a8 15865 7ff79b603ea0 3 API calls 15861->15865 15862->15838 15862->15861 15864 7ff79b615f40 RtlReAllocateHeap 15862->15864 15864->15862 15866 7ff79b5c9c03 15865->15866 15866->15838 15867 7ff79b5c28b0 2 API calls 15866->15867 15869 7ff79b5c9ce6 15867->15869 15868->15838 15868->15852 15868->15860 15939 7ff79b615f40 15868->15939 15869->15838 15870 7ff79b603160 24 API calls 15869->15870 15871 7ff79b5c9d66 15870->15871 15872 7ff79b603430 24 API calls 15871->15872 15873 7ff79b5c9d6e 15872->15873 15922 7ff79b5c48c0 15873->15922 15876 7ff79b603160 24 API calls 15877 7ff79b5c9d93 15876->15877 15878 7ff79b603430 24 API calls 15877->15878 15879 7ff79b5c9d9b 15878->15879 15880 7ff79b5c48c0 4 API calls 15879->15880 15881 7ff79b5c9db1 15880->15881 15882 7ff79b603ea0 3 API calls 15881->15882 15883 7ff79b5c9dcb 15882->15883 15883->15838 15884 7ff79b5c28b0 2 API calls 15883->15884 15886 7ff79b5c9ed7 15884->15886 15885->15843 15886->15838 15886->15885 15889 7ff79b603193 15887->15889 15888 7ff79b603422 15889->15888 15890 7ff79b603259 GlobalMemoryStatusEx 15889->15890 15891 7ff79b60332e K32GetPerformanceInfo 15890->15891 15892 7ff79b603328 15890->15892 15893 7ff79b603379 15891->15893 15892->15891 15943 7ff79b5fcc30 15893->15943 15895 7ff79b6033db 15953 7ff79b5fd0c0 15895->15953 15897 7ff79b6033fc 15897->15825 15899 7ff79b603471 15898->15899 15900 7ff79b603477 K32GetPerformanceInfo 15898->15900 15899->15900 15901 7ff79b6034be 15900->15901 15902 7ff79b5fcc30 2 API calls 15901->15902 15903 7ff79b603516 15902->15903 15904 7ff79b5fd0c0 22 API calls 15903->15904 15905 7ff79b5c8127 GetComputerNameExW 15904->15905 15905->15829 15907 7ff79b603de7 CoInitializeSecurity 15906->15907 15908 7ff79b603e28 15906->15908 15907->15908 15908->15839 15910 7ff79b603ef1 15909->15910 15911 7ff79b5c83e0 15909->15911 15910->15911 16120 7ff79b6038b0 15910->16120 15911->15845 15914 7ff79b603f6d CoSetProxyBlanket 15914->15911 15916 7ff79b6038b0 SysAllocStringLen 15915->15916 15917 7ff79b5c28e0 15916->15917 15918 7ff79b6038b0 SysAllocStringLen 15917->15918 15920 7ff79b5c28ee 15918->15920 15919 7ff79b5c2a6d 15919->15856 15920->15919 15921 7ff79b615f40 RtlReAllocateHeap 15920->15921 15921->15920 15923 7ff79b5c4b8f 15922->15923 15926 7ff79b5c48e5 15922->15926 15923->15876 15924 7ff79b5c4b5a 15924->15923 15925 7ff79b5c4b79 RtlFreeHeap 15924->15925 15925->15923 15926->15924 15927 7ff79b5c49ea RtlFreeHeap 15926->15927 15928 7ff79b5c4a90 RtlFreeHeap 15926->15928 15929 7ff79b5c4aba RtlFreeHeap 15926->15929 15927->15926 15928->15926 15929->15926 15931 7ff79b5f21cd 15930->15931 15933 7ff79b5f21fb 15930->15933 15931->15933 16124 7ff79b615530 15931->16124 15933->15848 16132 7ff79b5fc890 15934->16132 15936 7ff79b5fc889 16137 7ff79b5fc8e0 ExitProcess 15936->16137 15940 7ff79b615f52 15939->15940 15942 7ff79b615fe5 15939->15942 15941 7ff79b5ec160 RtlReAllocateHeap 15940->15941 15940->15942 15941->15942 15942->15868 15942->15942 15945 7ff79b5fcf3d 15943->15945 15946 7ff79b5fcc65 15943->15946 15944 7ff79b5fdbe0 2 API calls 15948 7ff79b5fcf9a 15944->15948 15945->15944 15945->15948 15946->15945 15946->15948 15975 7ff79b6028e0 15946->15975 15948->15895 15949 7ff79b5fce2e 15981 7ff79b5fdbe0 15949->15981 15951 7ff79b5fce38 15951->15945 15952 7ff79b6028e0 RtlReAllocateHeap 15951->15952 15952->15951 15957 7ff79b5fd0fc 15953->15957 15954 7ff79b5fdb22 15955 7ff79b5fd16d NtQuerySystemInformation 15955->15957 15962 7ff79b5fd209 15955->15962 15956 7ff79b615f40 RtlReAllocateHeap 15956->15957 15957->15954 15957->15955 15957->15956 15958 7ff79b5fd2c0 15957->15958 15959 7ff79b5fda49 RtlFreeHeap 15958->15959 15964 7ff79b5fda4f 15958->15964 15959->15964 15960 7ff79b5fd292 15963 7ff79b5fdbe0 2 API calls 15960->15963 15966 7ff79b5fd2ba 15960->15966 15962->15954 15962->15960 16073 7ff79b5fdb30 15962->16073 15963->15966 15964->15897 15964->15964 15965 7ff79b5fd415 16066 7ff79b5fe4e0 15965->16066 15966->15954 15966->15965 16059 7ff79b5e9900 15966->16059 15969 7ff79b5fd467 15970 7ff79b615f40 RtlReAllocateHeap 15969->15970 15972 7ff79b5fd4cc 15969->15972 15970->15972 15971 7ff79b5fda1f RtlFreeHeap 15971->15958 15973 7ff79b615f40 RtlReAllocateHeap 15972->15973 15974 7ff79b5fd5b7 15972->15974 15973->15972 15974->15958 15974->15971 15977 7ff79b602936 15975->15977 15978 7ff79b602952 15975->15978 15977->15978 15979 7ff79b615f40 RtlReAllocateHeap 15977->15979 15980 7ff79b602bad 15977->15980 15978->15980 16002 7ff79b5ee370 15978->16002 15979->15977 15980->15949 15982 7ff79b5fdbfe GetSystemInfo 15981->15982 16000 7ff79b5fdfca 15981->16000 15983 7ff79b5fddf7 15982->15983 15987 7ff79b5fdc5c 15982->15987 15984 7ff79b6024e0 RtlReAllocateHeap 15983->15984 15983->16000 15986 7ff79b5fdf09 15984->15986 15988 7ff79b6024e0 RtlReAllocateHeap 15986->15988 15991 7ff79b5fdd2c 15987->15991 15987->16000 16037 7ff79b602590 15987->16037 15989 7ff79b5fdf13 15988->15989 15990 7ff79b6024e0 RtlReAllocateHeap 15989->15990 15999 7ff79b5fdf1d 15990->15999 15991->15983 15991->16000 16041 7ff79b6024e0 15991->16041 15994 7ff79b6024e0 RtlReAllocateHeap 15995 7ff79b5fdd98 15994->15995 15996 7ff79b6024e0 RtlReAllocateHeap 15995->15996 15998 7ff79b5fdda4 15996->15998 15997 7ff79b6024e0 RtlReAllocateHeap 15997->15998 15998->15983 15998->15997 15999->16000 16051 7ff79b602830 15999->16051 16000->15951 16003 7ff79b5ee3ef 16002->16003 16005 7ff79b5ee383 16002->16005 16007 7ff79b5ee3f6 16003->16007 16023 7ff79b5ee750 16003->16023 16005->16003 16019 7ff79b5ec160 16005->16019 16007->15980 16008 7ff79b615f40 RtlReAllocateHeap 16009 7ff79b5ee43a 16008->16009 16009->16008 16010 7ff79b5ee60a 16009->16010 16013 7ff79b5ee44f 16009->16013 16014 7ff79b5ee749 16009->16014 16011 7ff79b5ee613 16010->16011 16010->16014 16029 7ff79b5ed620 16011->16029 16013->15980 16033 7ff79b5ee8d0 16014->16033 16017 7ff79b5ee370 RtlReAllocateHeap 16018 7ff79b5ee860 16017->16018 16018->15980 16020 7ff79b5ec177 16019->16020 16022 7ff79b5ec195 16019->16022 16021 7ff79b5ec17e RtlReAllocateHeap 16020->16021 16020->16022 16021->16022 16022->16003 16024 7ff79b5ee763 16023->16024 16025 7ff79b5ee8d0 RtlReAllocateHeap 16024->16025 16026 7ff79b5ee7db 16025->16026 16027 7ff79b5ee370 RtlReAllocateHeap 16026->16027 16028 7ff79b5ee860 16026->16028 16027->16028 16028->16009 16030 7ff79b5ed635 16029->16030 16031 7ff79b5ed85b 16030->16031 16032 7ff79b615f40 RtlReAllocateHeap 16030->16032 16031->16013 16032->16030 16036 7ff79b5ee8fb 16033->16036 16034 7ff79b615f40 RtlReAllocateHeap 16035 7ff79b5ee7db 16034->16035 16035->16017 16035->16018 16036->16034 16036->16035 16038 7ff79b602617 16037->16038 16039 7ff79b6025a3 16037->16039 16038->15987 16039->16038 16040 7ff79b5ec160 RtlReAllocateHeap 16039->16040 16040->16038 16042 7ff79b602500 16041->16042 16043 7ff79b602508 16041->16043 16055 7ff79b6075f0 16042->16055 16045 7ff79b6075f0 RtlReAllocateHeap 16043->16045 16046 7ff79b60252f 16043->16046 16045->16046 16047 7ff79b602550 16046->16047 16049 7ff79b6075f0 RtlReAllocateHeap 16046->16049 16048 7ff79b5fdd8c 16047->16048 16050 7ff79b6075f0 RtlReAllocateHeap 16047->16050 16048->15994 16049->16047 16050->16048 16052 7ff79b6028ba 16051->16052 16053 7ff79b602846 16051->16053 16052->15999 16053->16052 16054 7ff79b5ec160 RtlReAllocateHeap 16053->16054 16054->16052 16056 7ff79b6075ff 16055->16056 16058 7ff79b60765b 16055->16058 16057 7ff79b5ec160 RtlReAllocateHeap 16056->16057 16056->16058 16057->16058 16058->16043 16060 7ff79b5e9935 16059->16060 16061 7ff79b5e991d 16059->16061 16077 7ff79b615170 16060->16077 16065 7ff79b5e992d 16061->16065 16081 7ff79b5e9a20 16061->16081 16064 7ff79b5e9a16 16064->15965 16065->15965 16071 7ff79b5fe543 16066->16071 16067 7ff79b5ed620 RtlReAllocateHeap 16067->16071 16068 7ff79b5fec92 16068->15969 16069 7ff79b5fe772 GetProcessTimes 16069->16071 16070 7ff79b600830 17 API calls 16070->16071 16071->16067 16071->16068 16071->16069 16071->16070 16116 7ff79b5ff350 16071->16116 16074 7ff79b5fdb43 16073->16074 16076 7ff79b5fdbb8 16073->16076 16075 7ff79b5ec160 RtlReAllocateHeap 16074->16075 16074->16076 16075->16076 16076->15962 16078 7ff79b61518e 16077->16078 16079 7ff79b6152bc 16078->16079 16080 7ff79b5e9a20 3 API calls 16078->16080 16079->16061 16080->16079 16082 7ff79b5e9a46 16081->16082 16083 7ff79b5e9d07 16081->16083 16086 7ff79b5e9d10 16082->16086 16085 7ff79b5e9a8e 16085->16064 16087 7ff79b5e9d63 16086->16087 16097 7ff79b5ea18f 16086->16097 16098 7ff79b5ee410 16087->16098 16089 7ff79b5ee410 RtlReAllocateHeap 16092 7ff79b5e9e15 16089->16092 16090 7ff79b5ea14a GetSystemInfo 16090->16097 16091 7ff79b5e9d7d 16091->16089 16091->16092 16092->16090 16092->16097 16093 7ff79b5ee410 RtlReAllocateHeap 16093->16097 16094 7ff79b615530 RtlReAllocateHeap 16094->16097 16096 7ff79b5eaccf 16096->16085 16097->16093 16097->16094 16097->16096 16111 7ff79b5fabb0 16097->16111 16099 7ff79b5ee750 RtlReAllocateHeap 16098->16099 16101 7ff79b5ee43a 16099->16101 16100 7ff79b615f40 RtlReAllocateHeap 16100->16101 16101->16100 16102 7ff79b5ee60a 16101->16102 16105 7ff79b5ee749 16101->16105 16107 7ff79b5ee44f 16101->16107 16103 7ff79b5ee613 16102->16103 16102->16105 16104 7ff79b5ed620 RtlReAllocateHeap 16103->16104 16104->16107 16106 7ff79b5ee8d0 RtlReAllocateHeap 16105->16106 16108 7ff79b5ee7db 16106->16108 16107->16091 16109 7ff79b5ee370 RtlReAllocateHeap 16108->16109 16110 7ff79b5ee860 16108->16110 16109->16110 16110->16091 16112 7ff79b5fabd5 16111->16112 16113 7ff79b5fabde CreateThread 16112->16113 16114 7ff79b5fac84 16112->16114 16115 7ff79b5fac18 16113->16115 16114->16097 16115->16097 16117 7ff79b5ff3dd 16116->16117 16118 7ff79b5ff366 16116->16118 16117->16071 16118->16117 16119 7ff79b5ec160 RtlReAllocateHeap 16118->16119 16119->16117 16121 7ff79b6038da 16120->16121 16122 7ff79b6038c5 16120->16122 16121->15911 16121->15914 16122->16121 16123 7ff79b603afc SysAllocStringLen 16122->16123 16123->16121 16125 7ff79b615571 16124->16125 16127 7ff79b6155f4 16125->16127 16128 7ff79b5f1e50 16125->16128 16127->15933 16129 7ff79b5f1e79 16128->16129 16131 7ff79b5f1f08 16128->16131 16130 7ff79b5ec160 RtlReAllocateHeap 16129->16130 16129->16131 16130->16131 16131->16127 16133 7ff79b5fc8a4 16132->16133 16134 7ff79b5fc89f 16132->16134 16135 7ff79b615170 3 API calls 16133->16135 16134->15936 16136 7ff79b5fc8cd 16135->16136 16136->15936 16261 7ff79b5c74c0 16262 7ff79b5c74ea 16261->16262 16263 7ff79b5c759d 16262->16263 16266 7ff79b5c7ac0 16262->16266 16268 7ff79b5c7ae2 16266->16268 16267 7ff79b5c7526 16268->16267 16269 7ff79b615f40 RtlReAllocateHeap 16268->16269 16269->16268 16138 7ff79b5ca616 16139 7ff79b5c8423 16138->16139 16140 7ff79b5ca625 16138->16140 16141 7ff79b603ea0 3 API calls 16139->16141 16165 7ff79b5c8440 16141->16165 16142 7ff79b5f21b0 RtlReAllocateHeap 16146 7ff79b5cad10 16142->16146 16143 7ff79b5f21b0 RtlReAllocateHeap 16143->16146 16144 7ff79b5cb506 16145 7ff79b5fc880 4 API calls 16144->16145 16147 7ff79b5cb50b 16145->16147 16146->16143 16146->16144 16148 7ff79b5fc880 4 API calls 16146->16148 16148->16146 16149 7ff79b6038b0 SysAllocStringLen 16149->16165 16150 7ff79b603ea0 3 API calls 16151 7ff79b5c95a6 16150->16151 16152 7ff79b5c28b0 2 API calls 16151->16152 16153 7ff79b5cab67 16151->16153 16154 7ff79b5c96c7 16152->16154 16153->16142 16154->16153 16155 7ff79b603ea0 3 API calls 16154->16155 16156 7ff79b5c9862 16155->16156 16156->16153 16157 7ff79b5c28b0 2 API calls 16156->16157 16161 7ff79b5c9936 16157->16161 16158 7ff79b5c93c5 16158->16150 16158->16153 16159 7ff79b5c99a8 16163 7ff79b603ea0 3 API calls 16159->16163 16160 7ff79b615f40 RtlReAllocateHeap 16160->16165 16161->16153 16161->16159 16162 7ff79b615f40 RtlReAllocateHeap 16161->16162 16162->16161 16164 7ff79b5c9c03 16163->16164 16164->16153 16166 7ff79b5c28b0 2 API calls 16164->16166 16165->16149 16165->16153 16165->16158 16165->16160 16167 7ff79b5c9ce6 16166->16167 16167->16153 16168 7ff79b603160 24 API calls 16167->16168 16169 7ff79b5c9d66 16168->16169 16170 7ff79b603430 24 API calls 16169->16170 16171 7ff79b5c9d6e 16170->16171 16172 7ff79b5c48c0 4 API calls 16171->16172 16173 7ff79b5c9d83 16172->16173 16174 7ff79b603160 24 API calls 16173->16174 16175 7ff79b5c9d93 16174->16175 16176 7ff79b603430 24 API calls 16175->16176 16177 7ff79b5c9d9b 16176->16177 16178 7ff79b5c48c0 4 API calls 16177->16178 16179 7ff79b5c9db1 16178->16179 16180 7ff79b603ea0 3 API calls 16179->16180 16181 7ff79b5c9dcb 16180->16181 16181->16153 16182 7ff79b5c28b0 2 API calls 16181->16182 16186 7ff79b5c9ed7 16182->16186 16183 7ff79b5ca438 16184 7ff79b5c48c0 4 API calls 16183->16184 16185 7ff79b5ca472 16184->16185 16186->16153 16186->16183 16187 7ff79b5cc360 16199 7ff79b5ed570 16187->16199 16189 7ff79b5cc37d 16190 7ff79b5fc880 4 API calls 16189->16190 16191 7ff79b5cf6f8 16190->16191 16192 7ff79b5f21b0 RtlReAllocateHeap 16191->16192 16193 7ff79b5cf810 16192->16193 16194 7ff79b5fc880 4 API calls 16193->16194 16195 7ff79b5cf815 16194->16195 16196 7ff79b5d1073 SetThreadStackGuarantee 16195->16196 16197 7ff79b5d108c SetThreadDescription 16196->16197 16198 7ff79b5d10b3 16197->16198 16200 7ff79b5ed590 16199->16200 16201 7ff79b5ed595 SetWaitableTimer 16200->16201 16202 7ff79b5ed5eb 16200->16202 16201->16202 16203 7ff79b5ed5cd CloseHandle 16201->16203 16202->16189 16203->16202 16274 7ff79b5fc780 16277 7ff79b5f2810 16274->16277 16276 7ff79b5fc7a9 16280 7ff79b5f2a84 16277->16280 16288 7ff79b5f2864 16277->16288 16278 7ff79b5f7220 RtlReAllocateHeap 16278->16280 16279 7ff79b5f3637 16285 7ff79b5f365a 16279->16285 16286 7ff79b5f37aa 16279->16286 16280->16279 16281 7ff79b5f367a 16280->16281 16280->16286 16289 7ff79b5f2e07 16280->16289 16294 7ff79b5f375c 16280->16294 16282 7ff79b5f367e 16281->16282 16281->16285 16284 7ff79b5ee750 RtlReAllocateHeap 16282->16284 16283 7ff79b5ed620 RtlReAllocateHeap 16283->16288 16287 7ff79b5f3691 16284->16287 16285->16289 16382 7ff79b5eec30 16285->16382 16286->16289 16295 7ff79b5f4146 16286->16295 16299 7ff79b5f36aa 16286->16299 16309 7ff79b5ee370 RtlReAllocateHeap 16286->16309 16321 7ff79b5f90f0 RtlReAllocateHeap 16286->16321 16336 7ff79b5ec160 RtlReAllocateHeap 16286->16336 16412 7ff79b5f2660 16286->16412 16287->16299 16398 7ff79b5f9210 16287->16398 16288->16283 16288->16289 16304 7ff79b5f2a8c 16288->16304 16378 7ff79b5f7220 16288->16378 16289->16276 16292 7ff79b5ee750 RtlReAllocateHeap 16296 7ff79b5f428b 16292->16296 16293 7ff79b5f3731 16393 7ff79b5f90f0 16293->16393 16294->16289 16294->16292 16294->16299 16418 7ff79b5eea80 16295->16418 16296->16299 16302 7ff79b5f9210 RtlReAllocateHeap 16296->16302 16299->16289 16303 7ff79b5f46f0 16299->16303 16307 7ff79b615f40 RtlReAllocateHeap 16299->16307 16325 7ff79b5f44d0 16299->16325 16301 7ff79b5f4153 16301->16289 16313 7ff79b5f5778 16301->16313 16314 7ff79b5f4172 16301->16314 16315 7ff79b5f2660 RtlReAllocateHeap 16301->16315 16302->16299 16305 7ff79b5ee370 RtlReAllocateHeap 16303->16305 16304->16278 16304->16289 16304->16304 16306 7ff79b5f47df 16305->16306 16308 7ff79b5ee8d0 RtlReAllocateHeap 16306->16308 16307->16299 16311 7ff79b5f4822 16308->16311 16309->16286 16310 7ff79b615f40 RtlReAllocateHeap 16310->16314 16312 7ff79b5ee370 RtlReAllocateHeap 16311->16312 16317 7ff79b5f4841 16311->16317 16312->16317 16316 7ff79b5f90f0 RtlReAllocateHeap 16313->16316 16314->16289 16314->16310 16322 7ff79b5f5921 16314->16322 16342 7ff79b5f5994 16314->16342 16359 7ff79b5f5c6c 16314->16359 16315->16313 16316->16314 16317->16289 16319 7ff79b5ee370 RtlReAllocateHeap 16317->16319 16324 7ff79b5f4924 16317->16324 16424 7ff79b5f92d0 16317->16424 16319->16317 16321->16286 16322->16289 16326 7ff79b5ed620 RtlReAllocateHeap 16322->16326 16323 7ff79b5f498c 16328 7ff79b5ee370 RtlReAllocateHeap 16323->16328 16335 7ff79b5f4ae0 16323->16335 16353 7ff79b5f4a0f 16323->16353 16324->16289 16324->16323 16327 7ff79b5ee370 RtlReAllocateHeap 16324->16327 16325->16289 16325->16303 16338 7ff79b5f458d 16325->16338 16330 7ff79b5f593d 16326->16330 16327->16323 16328->16353 16329 7ff79b5f5974 16332 7ff79b5f90f0 RtlReAllocateHeap 16329->16332 16330->16329 16331 7ff79b5f2660 RtlReAllocateHeap 16330->16331 16331->16329 16332->16342 16333 7ff79b615f40 RtlReAllocateHeap 16333->16338 16334 7ff79b5f7220 RtlReAllocateHeap 16334->16335 16335->16289 16335->16334 16339 7ff79b5ee370 RtlReAllocateHeap 16335->16339 16336->16286 16337 7ff79b5ee410 RtlReAllocateHeap 16356 7ff79b5f5db1 16337->16356 16338->16289 16338->16333 16358 7ff79b5f4a6d 16338->16358 16339->16335 16340 7ff79b615f40 RtlReAllocateHeap 16340->16342 16341 7ff79b5f554a 16341->16335 16344 7ff79b5ee370 RtlReAllocateHeap 16341->16344 16342->16289 16342->16299 16342->16340 16346 7ff79b5f5bf9 16342->16346 16342->16359 16343 7ff79b5f554f 16345 7ff79b615f40 RtlReAllocateHeap 16343->16345 16344->16335 16345->16289 16346->16289 16347 7ff79b5ed620 RtlReAllocateHeap 16346->16347 16351 7ff79b5f5c15 16347->16351 16348 7ff79b5ee370 RtlReAllocateHeap 16348->16356 16349 7ff79b5ed620 RtlReAllocateHeap 16349->16356 16350 7ff79b5ee370 RtlReAllocateHeap 16350->16353 16352 7ff79b5f5c4c 16351->16352 16354 7ff79b5f2660 RtlReAllocateHeap 16351->16354 16355 7ff79b5f90f0 RtlReAllocateHeap 16352->16355 16353->16289 16353->16341 16353->16343 16353->16350 16357 7ff79b5ee8d0 RtlReAllocateHeap 16353->16357 16354->16352 16355->16359 16356->16289 16356->16299 16356->16348 16356->16349 16361 7ff79b5f2660 RtlReAllocateHeap 16356->16361 16362 7ff79b5f90f0 RtlReAllocateHeap 16356->16362 16357->16353 16358->16289 16360 7ff79b615f40 RtlReAllocateHeap 16358->16360 16364 7ff79b5f4e06 16358->16364 16359->16299 16359->16337 16360->16358 16361->16356 16362->16356 16363 7ff79b5f5025 16366 7ff79b5ee370 RtlReAllocateHeap 16363->16366 16367 7ff79b5f505c 16363->16367 16364->16289 16364->16363 16365 7ff79b615f40 RtlReAllocateHeap 16364->16365 16365->16364 16366->16367 16367->16289 16368 7ff79b5f6fd2 16367->16368 16370 7ff79b5f618f 16367->16370 16369 7ff79b615f40 RtlReAllocateHeap 16368->16369 16369->16289 16371 7ff79b5ee370 RtlReAllocateHeap 16370->16371 16377 7ff79b5f61b5 16370->16377 16371->16377 16372 7ff79b5f6286 16372->16324 16373 7ff79b5ee370 RtlReAllocateHeap 16372->16373 16373->16324 16374 7ff79b5f92d0 RtlReAllocateHeap 16374->16377 16375 7ff79b615f40 RtlReAllocateHeap 16375->16377 16376 7ff79b5ee370 RtlReAllocateHeap 16376->16377 16377->16289 16377->16372 16377->16374 16377->16375 16377->16376 16380 7ff79b5f723c 16378->16380 16379 7ff79b5f72d7 16379->16288 16380->16379 16381 7ff79b5ee8d0 RtlReAllocateHeap 16380->16381 16381->16379 16385 7ff79b5eec5c 16382->16385 16383 7ff79b5eed17 16384 7ff79b5eedfb 16383->16384 16386 7ff79b615f40 RtlReAllocateHeap 16383->16386 16384->16293 16385->16383 16387 7ff79b5eecf3 16385->16387 16388 7ff79b5eee4b 16385->16388 16386->16384 16387->16383 16390 7ff79b5eee68 16387->16390 16389 7ff79b615f40 RtlReAllocateHeap 16388->16389 16389->16390 16391 7ff79b615f40 RtlReAllocateHeap 16390->16391 16392 7ff79b5eeea0 16391->16392 16394 7ff79b5ee750 RtlReAllocateHeap 16393->16394 16395 7ff79b5f9112 16394->16395 16396 7ff79b5f9210 RtlReAllocateHeap 16395->16396 16397 7ff79b5f9147 16395->16397 16396->16397 16397->16294 16399 7ff79b5f921f 16398->16399 16400 7ff79b5f922f 16398->16400 16399->16299 16402 7ff79b5f926b 16400->16402 16406 7ff79b5f92ac 16400->16406 16401 7ff79b615f40 RtlReAllocateHeap 16401->16402 16402->16401 16404 7ff79b5fb567 16402->16404 16407 7ff79b5fb5be 16402->16407 16403 7ff79b615f40 RtlReAllocateHeap 16403->16406 16405 7ff79b5ee370 RtlReAllocateHeap 16404->16405 16404->16407 16405->16407 16406->16403 16408 7ff79b5fb837 16406->16408 16409 7ff79b5fb890 16406->16409 16407->16299 16408->16409 16410 7ff79b5ee370 RtlReAllocateHeap 16408->16410 16409->16299 16411 7ff79b5fb974 16410->16411 16416 7ff79b5f267d 16412->16416 16413 7ff79b5f26a7 16413->16286 16414 7ff79b5f279b 16414->16413 16415 7ff79b5eec30 RtlReAllocateHeap 16414->16415 16415->16413 16416->16413 16416->16414 16417 7ff79b5ec160 RtlReAllocateHeap 16416->16417 16417->16414 16420 7ff79b5eeace 16418->16420 16419 7ff79b615f40 RtlReAllocateHeap 16419->16420 16420->16419 16421 7ff79b5eebb7 16420->16421 16423 7ff79b5eebc9 16420->16423 16422 7ff79b5ed620 RtlReAllocateHeap 16421->16422 16421->16423 16422->16423 16423->16301 16426 7ff79b5f9320 16424->16426 16425 7ff79b5f9722 16425->16317 16426->16425 16427 7ff79b5ee370 RtlReAllocateHeap 16426->16427 16430 7ff79b5f93ef 16426->16430 16427->16430 16428 7ff79b5f9661 16428->16425 16431 7ff79b615f40 RtlReAllocateHeap 16428->16431 16433 7ff79b5f967e 16428->16433 16429 7ff79b5ee370 RtlReAllocateHeap 16429->16430 16430->16428 16430->16429 16432 7ff79b5f974b 16430->16432 16434 7ff79b615f40 RtlReAllocateHeap 16430->16434 16431->16433 16433->16425 16435 7ff79b5ee370 RtlReAllocateHeap 16433->16435 16434->16430 16435->16425 16436 7ff79b5fc920 16437 7ff79b5fc936 16436->16437 16439 7ff79b5fc9ae 16436->16439 16438 7ff79b5ec160 RtlReAllocateHeap 16437->16438 16437->16439 16438->16439 16448 7ff79b5f17f0 16453 7ff79b5f1a10 16448->16453 16450 7ff79b5f1814 16451 7ff79b5f185d 16450->16451 16452 7ff79b5f1a10 RtlReAllocateHeap 16450->16452 16452->16451 16460 7ff79b5eeeb0 16453->16460 16456 7ff79b5ee750 RtlReAllocateHeap 16457 7ff79b5f1aad 16456->16457 16459 7ff79b5f1af5 16457->16459 16465 7ff79b5ef440 16457->16465 16459->16450 16461 7ff79b5ee750 RtlReAllocateHeap 16460->16461 16462 7ff79b5eeed0 16461->16462 16463 7ff79b5ef440 RtlReAllocateHeap 16462->16463 16464 7ff79b5eef12 16462->16464 16463->16464 16464->16456 16464->16459 16467 7ff79b5ef461 16465->16467 16466 7ff79b615f40 RtlReAllocateHeap 16466->16467 16467->16466 16468 7ff79b5ef679 16467->16468 16469 7ff79b5ef4b2 16467->16469 16468->16469 16470 7ff79b5ef748 16468->16470 16474 7ff79b5ef6a9 16468->16474 16469->16459 16471 7ff79b5ec160 RtlReAllocateHeap 16470->16471 16473 7ff79b5ef750 16470->16473 16471->16473 16472 7ff79b615f40 RtlReAllocateHeap 16475 7ff79b5ef91e 16472->16475 16473->16469 16473->16472 16473->16475 16474->16473 16477 7ff79b5ec160 RtlReAllocateHeap 16474->16477 16475->16469 16476 7ff79b5ee370 RtlReAllocateHeap 16475->16476 16476->16469 16477->16473 16205 7ff79b616ba0 16206 7ff79b616c3b 16205->16206 16207 7ff79b616c49 16206->16207 16209 7ff79b614040 16206->16209 16211 7ff79b61471c 16209->16211 16214 7ff79b61405d 16209->16214 16211->16207 16212 7ff79b5e86d0 GetSystemInfo RtlReAllocateHeap CreateThread 16212->16214 16214->16211 16214->16212 16214->16214 16215 7ff79b5e8510 16214->16215 16221 7ff79b614a80 16214->16221 16216 7ff79b5e859e 16215->16216 16219 7ff79b5e853e 16215->16219 16218 7ff79b5e8686 16216->16218 16225 7ff79b5e86d0 16216->16225 16218->16214 16219->16216 16220 7ff79b614a80 3 API calls 16219->16220 16220->16216 16223 7ff79b614a95 16221->16223 16222 7ff79b614d7f 16222->16214 16223->16222 16224 7ff79b615c70 3 API calls 16223->16224 16224->16222 16226 7ff79b5e8711 16225->16226 16233 7ff79b5e8729 16225->16233 16227 7ff79b5e886b 16226->16227 16228 7ff79b5e871a 16226->16228 16235 7ff79b615c70 16227->16235 16228->16233 16245 7ff79b613bf0 16228->16245 16231 7ff79b615c70 3 API calls 16231->16233 16232 7ff79b613bf0 3 API calls 16232->16233 16233->16231 16233->16232 16234 7ff79b5e8a04 16233->16234 16234->16216 16236 7ff79b615ed2 16235->16236 16239 7ff79b615c89 16235->16239 16237 7ff79b613bf0 3 API calls 16236->16237 16237->16239 16238 7ff79b615ee8 16241 7ff79b5ec160 RtlReAllocateHeap 16238->16241 16244 7ff79b615fe5 16238->16244 16239->16238 16240 7ff79b615df5 16239->16240 16243 7ff79b615e2f 16239->16243 16242 7ff79b5f1e50 RtlReAllocateHeap 16240->16242 16240->16243 16241->16244 16242->16243 16243->16233 16244->16233 16246 7ff79b613c0b 16245->16246 16247 7ff79b613c10 16245->16247 16246->16233 16248 7ff79b615170 3 API calls 16247->16248 16249 7ff79b613c3e 16248->16249 16249->16233 16270 7ff79b613cb0 16271 7ff79b613ceb 16270->16271 16272 7ff79b613f2e 16271->16272 16273 7ff79b5f1e50 RtlReAllocateHeap 16271->16273 16273->16272 16250 7ff79b5ca4e8 16251 7ff79b5ca52b 16250->16251 16252 7ff79b5c28b0 2 API calls 16251->16252 16258 7ff79b5ca5b5 16252->16258 16253 7ff79b5f21b0 RtlReAllocateHeap 16256 7ff79b5cad10 16253->16256 16254 7ff79b5cb506 16255 7ff79b5fc880 4 API calls 16254->16255 16259 7ff79b5cb50b 16255->16259 16256->16254 16257 7ff79b5f21b0 RtlReAllocateHeap 16256->16257 16260 7ff79b5fc880 4 API calls 16256->16260 16257->16256 16258->16253 16260->16256 16440 7ff79b5c75dc 16441 7ff79b5c7640 16440->16441 16443 7ff79b5c794c 16441->16443 16444 7ff79b5c6190 16441->16444 16445 7ff79b5c61a3 16444->16445 16447 7ff79b5c6217 16444->16447 16446 7ff79b5ec160 RtlReAllocateHeap 16445->16446 16445->16447 16446->16447 16447->16441
      APIs
        • Part of subcall function 00007FF79B603160: GlobalMemoryStatusEx.KERNELBASE ref: 00007FF79B60331E
        • Part of subcall function 00007FF79B603160: K32GetPerformanceInfo.KERNEL32 ref: 00007FF79B60336F
        • Part of subcall function 00007FF79B603430: GlobalMemoryStatusEx.KERNELBASE ref: 00007FF79B603467
        • Part of subcall function 00007FF79B603430: K32GetPerformanceInfo.KERNEL32 ref: 00007FF79B6034B4
      • GetComputerNameExW.KERNELBASE ref: 00007FF79B5C8141
      • GetComputerNameExW.KERNELBASE ref: 00007FF79B5C81B3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ComputerGlobalInfoMemoryNamePerformanceStatus
      • String ID: #$&$)Xz8$*$0$?$I$I$KA?%$URq`H>A$z,NL@F
      • API String ID: 2481501829-3466599246
      • Opcode ID: 5bb9fe6397150130f44c784404b9520b88cc905da7e13b9b281b4cfeb720198c
      • Instruction ID: b03bc28f5dc497b9e406172b84254ecda34d63a211afffb95681aac279ba2701
      • Opcode Fuzzy Hash: 5bb9fe6397150130f44c784404b9520b88cc905da7e13b9b281b4cfeb720198c
      • Instruction Fuzzy Hash: B1337F3260CBC685E771EB25E4443AAB7A1FB85B80F804135DA8D43BAADF3CD545DB60
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$MemoryReadTimes$CountersSystem
      • String ID:
      • API String ID: 3462355714-0
      • Opcode ID: eeabe16d969b514fe2044f6381f0e812845c59d15e4514921b9eff4297121f55
      • Instruction ID: 8b4230fc71dc201551045f27f59f3bffee5d0fc1dfdea717b8c463faefb28911
      • Opcode Fuzzy Hash: eeabe16d969b514fe2044f6381f0e812845c59d15e4514921b9eff4297121f55
      • Instruction Fuzzy Hash: 18D28421A0CB8A81E675AB3BE4443BAA3B1FB85B84F844535EA9D437A4DF3CF554C710

      Control-flow Graph

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandleTimerWaitable
      • String ID: &$*
      • API String ID: 3962215526-3922905904
      • Opcode ID: c0be20bab12fc9cbc3afd1eec7f90af267a6211573e193d29f0ee124c07708bf
      • Instruction ID: d8d5e091f91907362762bb19bee318e2801b5f22ab75918505c2eedfe6648055
      • Opcode Fuzzy Hash: c0be20bab12fc9cbc3afd1eec7f90af267a6211573e193d29f0ee124c07708bf
      • Instruction Fuzzy Hash: FAA16B32508B8195E760AB25E8503AABBB4FBC9780F904135EECD03765DF3CE545CB20

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 917 7ff79b5c48c0-7ff79b5c48df 918 7ff79b5c4b8f-7ff79b5c4b99 917->918 919 7ff79b5c48e5-7ff79b5c48f1 917->919 922 7ff79b5c4bad-7ff79b5c4bcb 918->922 923 7ff79b5c4b9b-7ff79b5c4ba6 918->923 920 7ff79b5c4b5a-7ff79b5c4b77 919->920 921 7ff79b5c48f7-7ff79b5c4916 919->921 920->918 924 7ff79b5c4b79-7ff79b5c4b89 RtlFreeHeap 920->924 925 7ff79b5c4933-7ff79b5c4936 921->925 926 7ff79b5c4bd1-7ff79b5c4bdc 922->926 932 7ff79b5c4c58-7ff79b5c4c5c 922->932 923->926 927 7ff79b5c4ba8 923->927 924->918 930 7ff79b5c4938 925->930 931 7ff79b5c495e-7ff79b5c497e 925->931 929 7ff79b5c4be9-7ff79b5c4bee 926->929 927->932 937 7ff79b5c4c00-7ff79b5c4c05 929->937 938 7ff79b5c4bf0-7ff79b5c4bfb 929->938 939 7ff79b5c4940-7ff79b5c495a 930->939 933 7ff79b5c4980-7ff79b5c498e 931->933 934 7ff79b5c4993-7ff79b5c49a4 931->934 935 7ff79b5c4c70-7ff79b5c4c7a 932->935 936 7ff79b5c4c5e-7ff79b5c4c67 932->936 933->934 940 7ff79b5c49e0-7ff79b5c49e8 934->940 941 7ff79b5c49a6-7ff79b5c49aa 934->941 942 7ff79b5c4c80-7ff79b5c4c8a 935->942 943 7ff79b5c4e1c-7ff79b5c4e2c 935->943 936->935 944 7ff79b5c4c17-7ff79b5c4c21 937->944 945 7ff79b5c4c07-7ff79b5c4c12 937->945 938->937 939->939 946 7ff79b5c495c 939->946 950 7ff79b5c49ea-7ff79b5c49f6 RtlFreeHeap 940->950 951 7ff79b5c49f9-7ff79b5c4a06 940->951 947 7ff79b5c49b9-7ff79b5c49be 941->947 948 7ff79b5c4c90-7ff79b5c4cab 942->948 949 7ff79b5c4d0a-7ff79b5c4d1e 942->949 952 7ff79b5c4c30-7ff79b5c4c44 944->952 953 7ff79b5c4c23-7ff79b5c4c28 944->953 945->944 946->931 956 7ff79b5c49b0-7ff79b5c49b7 947->956 957 7ff79b5c49c0-7ff79b5c49d0 947->957 958 7ff79b5c4cd0-7ff79b5c4cd3 948->958 954 7ff79b5c4d20-7ff79b5c4d28 949->954 955 7ff79b5c4d2a-7ff79b5c4d39 949->955 950->951 961 7ff79b5c4a30-7ff79b5c4a50 951->961 962 7ff79b5c4a08-7ff79b5c4a15 951->962 959 7ff79b5c4c46-7ff79b5c4c56 952->959 965 7ff79b5c4be0-7ff79b5c4be7 952->965 953->959 960 7ff79b5c4c2a 953->960 954->955 983 7ff79b5c4d4c-7ff79b5c4d61 954->983 963 7ff79b5c4d63-7ff79b5c4d73 955->963 964 7ff79b5c4d3b-7ff79b5c4d45 955->964 956->940 956->947 957->956 966 7ff79b5c4cb0-7ff79b5c4cb3 958->966 967 7ff79b5c4cd5 958->967 959->965 960->965 968 7ff79b5c4a52-7ff79b5c4a76 961->968 969 7ff79b5c4a17-7ff79b5c4a28 961->969 962->968 962->969 963->943 974 7ff79b5c4d79-7ff79b5c4d7c 963->974 964->974 975 7ff79b5c4d47 964->975 965->929 965->932 977 7ff79b5c4cb5-7ff79b5c4cc2 966->977 978 7ff79b5c4ce0-7ff79b5c4cf9 967->978 980 7ff79b5c4a78-7ff79b5c4a7c 968->980 982 7ff79b5c4ab0-7ff79b5c4ab8 968->982 979 7ff79b5c4a2a 969->979 969->980 987 7ff79b5c4d82-7ff79b5c4d99 974->987 988 7ff79b5c4e08-7ff79b5c4e1a 974->988 975->943 995 7ff79b5c4cc9-7ff79b5c4cce 977->995 978->978 981 7ff79b5c4cfb-7ff79b5c4d08 978->981 979->982 985 7ff79b5c4a89-7ff79b5c4a8e 980->985 981->977 993 7ff79b5c4aba-7ff79b5c4ac6 RtlFreeHeap 982->993 994 7ff79b5c4ac9-7ff79b5c4ad6 982->994 983->963 983->964 990 7ff79b5c4a80-7ff79b5c4a87 985->990 991 7ff79b5c4a90-7ff79b5c4aa0 RtlFreeHeap 985->991 989 7ff79b5c4daf-7ff79b5c4db3 987->989 988->943 992 7ff79b5c4e2d-7ff79b5c4e5c 988->992 996 7ff79b5c4de1-7ff79b5c4df4 989->996 997 7ff79b5c4db5 989->997 990->982 990->985 991->990 993->994 999 7ff79b5c4b00-7ff79b5c4b20 994->999 1000 7ff79b5c4ad8-7ff79b5c4ae5 994->1000 995->949 995->958 1002 7ff79b5c4da0-7ff79b5c4dad 996->1002 1003 7ff79b5c4df6-7ff79b5c4e06 996->1003 1001 7ff79b5c4dc0-7ff79b5c4ddc 997->1001 1004 7ff79b5c4b22-7ff79b5c4b3c 999->1004 1005 7ff79b5c4ae7-7ff79b5c4aee 999->1005 1000->1004 1000->1005 1001->1001 1007 7ff79b5c4dde 1001->1007 1002->988 1002->989 1003->1002 1008 7ff79b5c4b42-7ff79b5c4b46 1004->1008 1010 7ff79b5c4920-7ff79b5c492d 1004->1010 1005->1008 1009 7ff79b5c4af0 1005->1009 1007->996 1008->1010 1012 7ff79b5c4b4c-7ff79b5c4b55 call 7ff79b5c6140 1008->1012 1009->1010 1010->920 1010->925 1012->1010
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID:
      • API String ID: 3298025750-0
      • Opcode ID: d0eff2a345894e264bf9e6ddb1ad699051f439cc1ca424ab7e9da3fde785d6a2
      • Instruction ID: 4ed4b25866fe90bc17896fd491502f1c1fc92adc748f5d99530b9bf127483a2b
      • Opcode Fuzzy Hash: d0eff2a345894e264bf9e6ddb1ad699051f439cc1ca424ab7e9da3fde785d6a2
      • Instruction Fuzzy Hash: 88E1A525B0DA4681FB75AB3AA4447799362FB84B94F89413ACE5D573A1DF3CE940C330

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1016 7ff79b612bb0-7ff79b612bcb 1017 7ff79b6134ca-7ff79b6134cf 1016->1017 1018 7ff79b612bd1-7ff79b612c15 1016->1018 1019 7ff79b612c17-7ff79b612c32 1018->1019 1020 7ff79b612c49-7ff79b612c54 1018->1020 1021 7ff79b612c38-7ff79b612c3c 1019->1021 1022 7ff79b612f9a-7ff79b612f9e 1019->1022 1023 7ff79b612c69-7ff79b612c76 1020->1023 1024 7ff79b612c56-7ff79b612c67 1020->1024 1027 7ff79b612f39-7ff79b612f48 1021->1027 1028 7ff79b612c42-7ff79b612c44 1021->1028 1025 7ff79b612fbb-7ff79b612fbf 1022->1025 1026 7ff79b612fa0-7ff79b612fb2 call 7ff79b608510 1022->1026 1023->1017 1030 7ff79b612c7c-7ff79b612cb4 1023->1030 1029 7ff79b612cb7-7ff79b612cc2 1024->1029 1033 7ff79b612fc5-7ff79b61301c 1025->1033 1026->1033 1041 7ff79b612fb4-7ff79b612fb6 1026->1041 1035 7ff79b612f50-7ff79b612f7e 1027->1035 1034 7ff79b612f84-7ff79b612f95 1028->1034 1029->1017 1031 7ff79b612cc8-7ff79b612ccf 1029->1031 1030->1029 1031->1017 1037 7ff79b612cd5-7ff79b612ce8 1031->1037 1039 7ff79b613049-7ff79b61304d 1033->1039 1034->1022 1035->1035 1036 7ff79b612f80-7ff79b612f82 1035->1036 1036->1022 1036->1034 1037->1017 1040 7ff79b612cee-7ff79b612cf1 1037->1040 1042 7ff79b61304f-7ff79b613084 1039->1042 1043 7ff79b613035-7ff79b613043 1039->1043 1040->1017 1044 7ff79b612cf7-7ff79b612d00 call 7ff79b5fc8f0 1040->1044 1045 7ff79b61349a-7ff79b6134a8 1041->1045 1047 7ff79b6130e9-7ff79b6130fd 1042->1047 1043->1039 1046 7ff79b61348d-7ff79b613496 1043->1046 1055 7ff79b612d05-7ff79b612d08 1044->1055 1051 7ff79b6134b2-7ff79b6134c9 1045->1051 1046->1045 1048 7ff79b613190-7ff79b6131ae 1047->1048 1049 7ff79b613103-7ff79b613118 1047->1049 1053 7ff79b61316e-7ff79b61317e 1048->1053 1054 7ff79b6131b0-7ff79b6131bc 1048->1054 1052 7ff79b613120-7ff79b613161 1049->1052 1052->1052 1056 7ff79b613163-7ff79b61316c 1052->1056 1057 7ff79b6131be-7ff79b6131df 1053->1057 1058 7ff79b613180 1053->1058 1054->1057 1059 7ff79b6131e3-7ff79b6131e5 1054->1059 1055->1017 1060 7ff79b612d0e-7ff79b612d4c call 7ff79b608bc0 1055->1060 1056->1053 1056->1054 1057->1059 1058->1059 1062 7ff79b6131e7-7ff79b6131fa 1059->1062 1063 7ff79b613200-7ff79b613203 1059->1063 1067 7ff79b612ec8-7ff79b612ed0 1060->1067 1068 7ff79b612d52-7ff79b612d91 1060->1068 1065 7ff79b613205-7ff79b61321b 1062->1065 1063->1065 1066 7ff79b613257-7ff79b61325c 1063->1066 1069 7ff79b61321d-7ff79b613255 1065->1069 1070 7ff79b613260-7ff79b613359 1065->1070 1066->1070 1071 7ff79b612ed5-7ff79b612ef7 1067->1071 1072 7ff79b612e06-7ff79b612e09 1068->1072 1069->1070 1073 7ff79b613388-7ff79b613396 1070->1073 1074 7ff79b61335b-7ff79b613364 1070->1074 1071->1051 1078 7ff79b612efd-7ff79b612f17 1071->1078 1079 7ff79b612e0b 1072->1079 1080 7ff79b612e2d-7ff79b612e6e call 7ff79b5c4e70 1072->1080 1076 7ff79b613398-7ff79b6133a0 1073->1076 1077 7ff79b6133a4-7ff79b6133ba 1073->1077 1075 7ff79b613370-7ff79b613386 1074->1075 1075->1073 1075->1075 1076->1077 1082 7ff79b613020-7ff79b61302f 1077->1082 1083 7ff79b6133c0-7ff79b6133e9 1077->1083 1078->1051 1084 7ff79b612f1d-7ff79b612f34 1078->1084 1085 7ff79b612e10-7ff79b612e29 1079->1085 1091 7ff79b612e97-7ff79b612ea5 1080->1091 1092 7ff79b612e70-7ff79b612e76 1080->1092 1089 7ff79b613033 1082->1089 1087 7ff79b6133eb-7ff79b6133f7 1083->1087 1088 7ff79b613450-7ff79b613488 1083->1088 1084->1051 1085->1085 1090 7ff79b612e2b 1085->1090 1093 7ff79b6133fd-7ff79b613402 1087->1093 1094 7ff79b613090-7ff79b6130e5 1087->1094 1088->1089 1089->1043 1090->1080 1097 7ff79b612eab-7ff79b612eb7 1091->1097 1098 7ff79b612da0-7ff79b612e00 1091->1098 1096 7ff79b612e80-7ff79b612e95 1092->1096 1093->1094 1099 7ff79b613408-7ff79b61340f 1093->1099 1094->1047 1096->1091 1096->1096 1097->1098 1098->1072 1101 7ff79b612ebc-7ff79b612ec6 1098->1101 1100 7ff79b613410-7ff79b61343a 1099->1100 1100->1100 1102 7ff79b61343c 1100->1102 1101->1071 1102->1047
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 2f1b377b0cbb2f23192a693665ccacffe5acc02d3fcde045f0ac7e8f5df46e16
      • Instruction ID: 1a889fbcf94c91ca0da6e3b43dd8999d04fe528d7fc054d87a1ca7dc0a7bc835
      • Opcode Fuzzy Hash: 2f1b377b0cbb2f23192a693665ccacffe5acc02d3fcde045f0ac7e8f5df46e16
      • Instruction Fuzzy Hash: 4E2225A2B19B8942EB24DF7DA410579A762F785BE4F409336DEBE173E5DA3CD2418300

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1133 7ff79b5fd0c0-7ff79b5fd0ff call 7ff79b5fc8f0 1136 7ff79b5fd105-7ff79b5fd145 1133->1136 1137 7ff79b5fdb22-7ff79b5fdb24 1133->1137 1138 7ff79b5fd15a-7ff79b5fd16b 1136->1138 1139 7ff79b5fd1e3-7ff79b5fd204 call 7ff79b615f40 1138->1139 1140 7ff79b5fd16d-7ff79b5fd17f NtQuerySystemInformation 1138->1140 1139->1140 1142 7ff79b5fd185-7ff79b5fd1af 1140->1142 1143 7ff79b5fd209-7ff79b5fd230 call 7ff79b5fc8f0 1140->1143 1149 7ff79b5fd1b5-7ff79b5fd1d2 1142->1149 1150 7ff79b5fd2c0-7ff79b5fd2c3 1142->1150 1143->1137 1148 7ff79b5fd236-7ff79b5fd257 1143->1148 1155 7ff79b5fd278-7ff79b5fd281 1148->1155 1151 7ff79b5fd150-7ff79b5fd155 1149->1151 1152 7ff79b5fd1d8-7ff79b5fd1de 1149->1152 1153 7ff79b5fd2c5 1150->1153 1154 7ff79b5fd2cb-7ff79b5fd2d1 1150->1154 1151->1138 1152->1151 1153->1154 1156 7ff79b5fda4f-7ff79b5fda56 1154->1156 1157 7ff79b5fd2d7-7ff79b5fd2e3 1154->1157 1158 7ff79b5fd283-7ff79b5fd290 call 7ff79b5fdb30 1155->1158 1159 7ff79b5fd260-7ff79b5fd276 1155->1159 1163 7ff79b5fdad1-7ff79b5fdaec 1156->1163 1164 7ff79b5fda58-7ff79b5fda6c 1156->1164 1161 7ff79b5fda49 RtlFreeHeap 1157->1161 1158->1159 1159->1155 1162 7ff79b5fd292-7ff79b5fd2ae 1159->1162 1161->1156 1166 7ff79b5fd2b0-7ff79b5fd2be call 7ff79b5fdbe0 1162->1166 1167 7ff79b5fd2e8 1162->1167 1168 7ff79b5fda94-7ff79b5fda98 1164->1168 1173 7ff79b5fd2ea-7ff79b5fd321 1166->1173 1167->1173 1170 7ff79b5fda70-7ff79b5fda74 1168->1170 1171 7ff79b5fda9a 1168->1171 1176 7ff79b5fda77-7ff79b5fda92 1170->1176 1174 7ff79b5fdaa0-7ff79b5fdabb 1171->1174 1179 7ff79b5fd323-7ff79b5fd325 1173->1179 1180 7ff79b5fd327-7ff79b5fd341 1173->1180 1174->1174 1177 7ff79b5fdabd-7ff79b5fdacf 1174->1177 1176->1163 1176->1168 1177->1176 1181 7ff79b5fd345-7ff79b5fd3e0 1179->1181 1180->1181 1181->1137 1182 7ff79b5fd3e6-7ff79b5fd413 1181->1182 1183 7ff79b5fd415-7ff79b5fd41b 1182->1183 1184 7ff79b5fd41d call 7ff79b5e9900 1182->1184 1185 7ff79b5fd422-7ff79b5fd46a call 7ff79b5fe4e0 1183->1185 1184->1185 1189 7ff79b5fd47e-7ff79b5fd49c 1185->1189 1190 7ff79b5fd46c-7ff79b5fd475 1185->1190 1191 7ff79b5fd49e-7ff79b5fd4a6 1189->1191 1192 7ff79b5fd4cc-7ff79b5fd4cf 1189->1192 1190->1189 1193 7ff79b5fd4b0-7ff79b5fd4b8 1191->1193 1194 7ff79b5fd4d5-7ff79b5fd4e6 1192->1194 1195 7ff79b5fd5bc-7ff79b5fd5ee 1192->1195 1198 7ff79b5fd4c3-7ff79b5fd4c6 1193->1198 1199 7ff79b5fd4ba-7ff79b5fd4c1 1193->1199 1200 7ff79b5fd4fc-7ff79b5fd503 1194->1200 1196 7ff79b5fd5f4-7ff79b5fd611 1195->1196 1197 7ff79b5fd9e1-7ff79b5fd9f7 1195->1197 1203 7ff79b5fd759-7ff79b5fd76a 1196->1203 1204 7ff79b5fda14-7ff79b5fda1d 1197->1204 1205 7ff79b5fd9f9-7ff79b5fd9fc 1197->1205 1198->1192 1206 7ff79b5fdaed-7ff79b5fdb17 call 7ff79b615f40 1198->1206 1199->1193 1199->1198 1201 7ff79b5fd505 1200->1201 1202 7ff79b5fd50d-7ff79b5fd527 1200->1202 1201->1202 1217 7ff79b5fd52d-7ff79b5fd543 1202->1217 1218 7ff79b5fd5b7-7ff79b5fd5ba 1202->1218 1203->1197 1208 7ff79b5fd770-7ff79b5fd80a call 7ff79b608510 call 7ff79b5ff1d0 1203->1208 1210 7ff79b5fda33-7ff79b5fda39 1204->1210 1211 7ff79b5fda1f-7ff79b5fda2d RtlFreeHeap 1204->1211 1207 7ff79b5fda00-7ff79b5fda12 call 7ff79b5fefe0 1205->1207 1206->1194 1221 7ff79b5fdb1d 1206->1221 1207->1204 1234 7ff79b5fd810-7ff79b5fd834 1208->1234 1235 7ff79b5fd9c7-7ff79b5fd9dc call 7ff79b616010 1208->1235 1210->1156 1216 7ff79b5fda3b-7ff79b5fda47 1210->1216 1211->1210 1216->1161 1223 7ff79b5fd545-7ff79b5fd571 call 7ff79b608510 1217->1223 1224 7ff79b5fd58b-7ff79b5fd5b5 call 7ff79b615f40 1217->1224 1218->1195 1222 7ff79b5fd637-7ff79b5fd63e 1218->1222 1221->1195 1226 7ff79b5fd640 1222->1226 1227 7ff79b5fd648-7ff79b5fd653 1222->1227 1238 7ff79b5fd4f0-7ff79b5fd4f6 1223->1238 1239 7ff79b5fd577-7ff79b5fd586 1223->1239 1224->1223 1226->1227 1231 7ff79b5fd655-7ff79b5fd658 1227->1231 1232 7ff79b5fd674-7ff79b5fd678 1227->1232 1237 7ff79b5fd660-7ff79b5fd672 call 7ff79b5fefe0 1231->1237 1241 7ff79b5fd620-7ff79b5fd635 1232->1241 1242 7ff79b5fd67a-7ff79b5fd689 1232->1242 1240 7ff79b5fd837-7ff79b5fd851 1234->1240 1235->1197 1237->1232 1238->1195 1238->1200 1239->1238 1245 7ff79b5fd853 1240->1245 1246 7ff79b5fd88c-7ff79b5fd896 1240->1246 1241->1195 1241->1222 1242->1241 1253 7ff79b5fd860-7ff79b5fd87d 1245->1253 1248 7ff79b5fd8af-7ff79b5fd8bb 1246->1248 1249 7ff79b5fd898-7ff79b5fd8ac 1246->1249 1255 7ff79b5fd8c1-7ff79b5fd8cc 1248->1255 1256 7ff79b5fd99f-7ff79b5fd9a8 1248->1256 1249->1248 1257 7ff79b5fd8e0-7ff79b5fd987 call 7ff79b608510 * 2 1253->1257 1258 7ff79b5fd87f-7ff79b5fd88a 1253->1258 1255->1240 1260 7ff79b5fd9ae-7ff79b5fd9c2 1256->1260 1261 7ff79b5fd68b-7ff79b5fd74c call 7ff79b608510 1256->1261 1266 7ff79b5fd750-7ff79b5fd753 1257->1266 1268 7ff79b5fd98d-7ff79b5fd99a call 7ff79b5fefe0 1257->1268 1258->1246 1258->1253 1260->1261 1261->1266 1266->1203 1266->1204 1268->1266
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: InformationQuerySystem
      • String ID:
      • API String ID: 3562636166-0
      • Opcode ID: 1500ad1ede40a55dbcf05df197c7e0d89e4849f4a278e3c4b3b9af12a05fd85d
      • Instruction ID: 6c2098b02384505822ed740e657fafb1e1863c441d37a630274afdee1641ef4c
      • Opcode Fuzzy Hash: 1500ad1ede40a55dbcf05df197c7e0d89e4849f4a278e3c4b3b9af12a05fd85d
      • Instruction Fuzzy Hash: 29428232A0CBC981E675AB29E4053AAE365FF85784F844635DE8D17BA6DF3CE244C710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1271 7ff79b5fdbe0-7ff79b5fdbf8 1272 7ff79b5fe48f-7ff79b5fe4a2 1271->1272 1273 7ff79b5fdbfe-7ff79b5fdc56 GetSystemInfo 1271->1273 1274 7ff79b5fdc5c-7ff79b5fdc7e call 7ff79b5fc8f0 1273->1274 1275 7ff79b5fddf7-7ff79b5fde06 1273->1275 1280 7ff79b5fdc84-7ff79b5fdcbc 1274->1280 1281 7ff79b5fe4d1-7ff79b5fe4d3 1274->1281 1277 7ff79b5fdeb7-7ff79b5fdedd call 7ff79b5fc8f0 1275->1277 1277->1281 1284 7ff79b5fdee3-7ff79b5fdf2a call 7ff79b6024e0 * 3 1277->1284 1283 7ff79b5fdcc0-7ff79b5fdce2 1280->1283 1285 7ff79b5fdce4-7ff79b5fdcf6 call 7ff79b602590 1283->1285 1286 7ff79b5fdcfe-7ff79b5fdd1f 1283->1286 1304 7ff79b5fdf4c-7ff79b5fdf64 call 7ff79b5dba40 1284->1304 1305 7ff79b5fdf2c-7ff79b5fdf2e 1284->1305 1285->1286 1290 7ff79b5fdd21-7ff79b5fdd2a 1286->1290 1291 7ff79b5fdd2c-7ff79b5fdd42 call 7ff79b5fc8f0 1286->1291 1290->1283 1290->1291 1291->1281 1298 7ff79b5fdd48-7ff79b5fdd6e 1291->1298 1299 7ff79b5fde45-7ff79b5fde4c 1298->1299 1300 7ff79b5fdd74-7ff79b5fddaa call 7ff79b6024e0 * 3 1298->1300 1303 7ff79b5fde51 1299->1303 1338 7ff79b5fddb0-7ff79b5fddbf call 7ff79b6024e0 1300->1338 1308 7ff79b5fde54-7ff79b5fde6c call 7ff79b5dba40 1303->1308 1317 7ff79b5fdf66-7ff79b5fdf6b 1304->1317 1318 7ff79b5fdf92-7ff79b5fdf9d 1304->1318 1309 7ff79b5fdf30-7ff79b5fdf34 1305->1309 1324 7ff79b5fde72-7ff79b5fde81 1308->1324 1325 7ff79b5fdfcf-7ff79b5fdfda 1308->1325 1310 7ff79b5fdf36-7ff79b5fdf3c 1309->1310 1311 7ff79b5fdf40-7ff79b5fdf46 1309->1311 1310->1309 1315 7ff79b5fdf3e 1310->1315 1311->1281 1311->1304 1315->1304 1321 7ff79b5fe013-7ff79b5fe01a 1317->1321 1322 7ff79b5fdf71-7ff79b5fdf8d 1317->1322 1318->1281 1323 7ff79b5fdfa3-7ff79b5fdfab 1318->1323 1326 7ff79b5fe020-7ff79b5fe034 call 7ff79b5fc8f0 1321->1326 1322->1326 1328 7ff79b5fe044 1323->1328 1329 7ff79b5fdfb1-7ff79b5fdfc8 call 7ff79b5fc8f0 1323->1329 1330 7ff79b5fde95-7ff79b5fde9e 1324->1330 1331 7ff79b5fde83-7ff79b5fde8c 1324->1331 1325->1281 1332 7ff79b5fdfe0-7ff79b5fdfeb 1325->1332 1326->1281 1349 7ff79b5fe03a-7ff79b5fe042 1326->1349 1339 7ff79b5fe049 1328->1339 1329->1339 1352 7ff79b5fdfca 1329->1352 1335 7ff79b5fdeb2 1330->1335 1336 7ff79b5fdea0-7ff79b5fdea9 1330->1336 1331->1330 1333 7ff79b5fe4a3 1332->1333 1334 7ff79b5fdff1-7ff79b5fe008 call 7ff79b5fc8f0 1332->1334 1342 7ff79b5fe4a9-7ff79b5fe4bd call 7ff79b608510 1333->1342 1334->1342 1353 7ff79b5fe00e 1334->1353 1335->1277 1336->1335 1355 7ff79b5fddc1-7ff79b5fddcc 1338->1355 1356 7ff79b5fde0b-7ff79b5fde18 1338->1356 1345 7ff79b5fe04e-7ff79b5fe05f call 7ff79b608510 1339->1345 1342->1331 1359 7ff79b5fe4c3 1342->1359 1361 7ff79b5fe073-7ff79b5fe07d 1345->1361 1362 7ff79b5fe061-7ff79b5fe06a 1345->1362 1349->1345 1352->1281 1353->1281 1355->1356 1360 7ff79b5fddce-7ff79b5fddf5 call 7ff79b6024e0 * 3 1355->1360 1356->1299 1358 7ff79b5fde1a-7ff79b5fde27 1356->1358 1365 7ff79b5fde30-7ff79b5fde35 1358->1365 1359->1330 1360->1338 1363 7ff79b5fe091-7ff79b5fe094 1361->1363 1364 7ff79b5fe07f-7ff79b5fe08f call 7ff79b602640 1361->1364 1362->1361 1368 7ff79b5fe096-7ff79b5fe0b2 call 7ff79b5fc8f0 1363->1368 1369 7ff79b5fe0b9 1363->1369 1378 7ff79b5fe0d6-7ff79b5fe0f3 call 7ff79b5fc8f0 1364->1378 1370 7ff79b5fde3b-7ff79b5fde41 1365->1370 1371 7ff79b5fe4c8-7ff79b5fe4cb 1365->1371 1376 7ff79b5fe0be-7ff79b5fe0ce 1368->1376 1382 7ff79b5fe0b4 1368->1382 1369->1376 1370->1365 1375 7ff79b5fde43 1370->1375 1371->1281 1371->1308 1375->1303 1376->1378 1378->1281 1386 7ff79b5fe0f9-7ff79b5fe127 1378->1386 1382->1281 1387 7ff79b5fe356-7ff79b5fe35f 1386->1387 1388 7ff79b5fe12d-7ff79b5fe13a 1386->1388 1390 7ff79b5fe375-7ff79b5fe383 1387->1390 1391 7ff79b5fe361-7ff79b5fe36a 1387->1391 1389 7ff79b5fe1b2-7ff79b5fe243 call 7ff79b5d1250 1388->1389 1398 7ff79b5fe245-7ff79b5fe259 call 7ff79b5fc8f0 1389->1398 1399 7ff79b5fe262-7ff79b5fe292 call 7ff79b608510 1389->1399 1393 7ff79b5fe385-7ff79b5fe38e 1390->1393 1394 7ff79b5fe399-7ff79b5fe39c 1390->1394 1391->1390 1393->1394 1396 7ff79b5fe3b2-7ff79b5fe3bf 1394->1396 1397 7ff79b5fe39e-7ff79b5fe3a7 1394->1397 1400 7ff79b5fe3c5-7ff79b5fe3d0 1396->1400 1401 7ff79b5fe458-7ff79b5fe45d 1396->1401 1397->1396 1398->1281 1413 7ff79b5fe25f 1398->1413 1414 7ff79b5fe294-7ff79b5fe2a8 call 7ff79b5fc8f0 1399->1414 1415 7ff79b5fe2b1-7ff79b5fe33c call 7ff79b608510 1399->1415 1402 7ff79b5fe3e9-7ff79b5fe3ee 1400->1402 1403 7ff79b5fe471-7ff79b5fe48a 1401->1403 1404 7ff79b5fe45f-7ff79b5fe468 1401->1404 1407 7ff79b5fe400-7ff79b5fe405 1402->1407 1408 7ff79b5fe3f0-7ff79b5fe3fb 1402->1408 1403->1272 1404->1403 1411 7ff79b5fe417-7ff79b5fe421 1407->1411 1412 7ff79b5fe407-7ff79b5fe412 1407->1412 1408->1407 1417 7ff79b5fe423-7ff79b5fe428 1411->1417 1418 7ff79b5fe430-7ff79b5fe444 1411->1418 1412->1411 1413->1399 1414->1281 1428 7ff79b5fe2ae 1414->1428 1424 7ff79b5fe342-7ff79b5fe351 call 7ff79b602830 1415->1424 1425 7ff79b5fe140-7ff79b5fe1ac 1415->1425 1421 7ff79b5fe446-7ff79b5fe456 1417->1421 1422 7ff79b5fe42a 1417->1422 1418->1421 1426 7ff79b5fe3e0-7ff79b5fe3e7 1418->1426 1421->1426 1422->1426 1424->1425 1425->1387 1425->1389 1426->1401 1426->1402 1428->1415
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID: 0
      • API String ID: 31276548-4108050209
      • Opcode ID: 597cab9ebb5884e2bbae08f8a4985ce3b6ec81c15f443b8fa1f42949449d4aac
      • Instruction ID: d0b3724a193cb2b2d747ff7b144639c4990b1b841a328758d52af492be9b0921
      • Opcode Fuzzy Hash: 597cab9ebb5884e2bbae08f8a4985ce3b6ec81c15f443b8fa1f42949449d4aac
      • Instruction Fuzzy Hash: C4329122A0DB8581E771AB29E4053BAE7A1FB88784F848135DE8D477A6DF3CF641C710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1432 7ff79b5ca4e8-7ff79b5ca5ba call 7ff79b5c6bf0 call 7ff79b5c28b0 1437 7ff79b5ca5c0-7ff79b5ca5f1 1432->1437 1438 7ff79b5cac0b-7ff79b5cad13 call 7ff79b5c6790 call 7ff79b5f21b0 1432->1438 1439 7ff79b5ca5f3-7ff79b5ca614 1437->1439 1440 7ff79b5ca632-7ff79b5ca67a 1437->1440 1473 7ff79b5cae55-7ff79b5caf42 call 7ff79b5c7480 call 7ff79b5f21b0 1438->1473 1474 7ff79b5cad19-7ff79b5cad21 1438->1474 1442 7ff79b5ca681-7ff79b5ca6e3 1439->1442 1440->1442 1444 7ff79b5ca9a9-7ff79b5ca9bf 1442->1444 1445 7ff79b5ca6e9-7ff79b5ca70f 1442->1445 1449 7ff79b5ca9e1-7ff79b5ca9ea 1444->1449 1450 7ff79b5ca9c1-7ff79b5ca9c8 1444->1450 1448 7ff79b5ca781-7ff79b5ca78e 1445->1448 1448->1444 1454 7ff79b5ca794-7ff79b5ca7c9 call 7ff79b5c7e60 1448->1454 1451 7ff79b5caa03-7ff79b5caa17 1449->1451 1452 7ff79b5ca9ec-7ff79b5ca9f5 1449->1452 1455 7ff79b5ca9d0-7ff79b5ca9df call 7ff79b5c3f00 1450->1455 1457 7ff79b5caaef-7ff79b5caaf4 1451->1457 1458 7ff79b5caa1d-7ff79b5caa20 1451->1458 1452->1451 1470 7ff79b5ca770-7ff79b5ca77b call 7ff79b5c3f00 1454->1470 1471 7ff79b5ca7cb-7ff79b5ca7cf 1454->1471 1455->1449 1467 7ff79b5caafa 1457->1467 1463 7ff79b5caa26-7ff79b5caa42 1458->1463 1464 7ff79b5caabb-7ff79b5caad6 1458->1464 1469 7ff79b5caa60-7ff79b5caa64 1463->1469 1464->1457 1466 7ff79b5caad8-7ff79b5caae7 1464->1466 1466->1457 1467->1438 1475 7ff79b5caa66 1469->1475 1476 7ff79b5caa91-7ff79b5caaa3 1469->1476 1470->1448 1470->1449 1471->1470 1477 7ff79b5ca7d1-7ff79b5ca7d8 1471->1477 1480 7ff79b5cad27-7ff79b5cad2c 1473->1480 1481 7ff79b5caf48-7ff79b5cb012 call 7ff79b5c7390 call 7ff79b5f21b0 1473->1481 1474->1480 1474->1481 1482 7ff79b5caa70-7ff79b5caa8c 1475->1482 1484 7ff79b5caaa5-7ff79b5caab9 1476->1484 1485 7ff79b5caa50-7ff79b5caa5e 1476->1485 1477->1438 1483 7ff79b5ca7de-7ff79b5ca7e2 1477->1483 1487 7ff79b5cad32-7ff79b5cad3a 1480->1487 1488 7ff79b5cb018-7ff79b5cb105 call 7ff79b5c72a0 call 7ff79b5f21b0 1480->1488 1481->1487 1481->1488 1482->1482 1490 7ff79b5caa8e 1482->1490 1491 7ff79b5ca803 1483->1491 1492 7ff79b5ca7e4-7ff79b5ca7f8 call 7ff79b5fc8f0 1483->1492 1484->1485 1485->1464 1485->1469 1495 7ff79b5cad40-7ff79b5cad49 1487->1495 1496 7ff79b5cb10b-7ff79b5cb217 call 7ff79b5c67c0 call 7ff79b5f21b0 1487->1496 1488->1495 1488->1496 1490->1476 1493 7ff79b5ca808-7ff79b5ca83a call 7ff79b608510 call 7ff79b5c4e70 1491->1493 1492->1438 1509 7ff79b5ca7fe-7ff79b5ca801 1492->1509 1533 7ff79b5ca840-7ff79b5ca86d 1493->1533 1534 7ff79b5ca992-7ff79b5ca9a4 call 7ff79b612300 1493->1534 1505 7ff79b5cad4f-7ff79b5cad54 1495->1505 1506 7ff79b5cb21d-7ff79b5cb316 call 7ff79b5c6ad0 call 7ff79b5f21b0 1495->1506 1496->1505 1496->1506 1514 7ff79b5cb31c-7ff79b5cb403 call 7ff79b5c71a0 call 7ff79b5f21b0 1505->1514 1515 7ff79b5cad5a-7ff79b5cad62 1505->1515 1506->1514 1506->1515 1509->1493 1521 7ff79b5cad68-7ff79b5cad6b 1514->1521 1522 7ff79b5cb409-7ff79b5cb500 call 7ff79b5c6e70 call 7ff79b5f21b0 1514->1522 1515->1521 1515->1522 1528 7ff79b5cb506-7ff79b5cb50b call 7ff79b5fc880 1521->1528 1529 7ff79b5cad71-7ff79b5cae50 call 7ff79b5c6580 call 7ff79b5f21b0 call 7ff79b5fc880 1521->1529 1522->1528 1522->1529 1529->1473 1541 7ff79b5ca870-7ff79b5ca88f 1533->1541 1534->1444 1546 7ff79b5ca891-7ff79b5ca89b 1541->1546 1547 7ff79b5ca8fd-7ff79b5ca914 1541->1547 1550 7ff79b5ca89d-7ff79b5ca8b5 1546->1550 1551 7ff79b5ca8ba-7ff79b5ca8cb 1546->1551 1552 7ff79b5ca916-7ff79b5ca92b call 7ff79b608410 1547->1552 1553 7ff79b5ca8f0-7ff79b5ca8fb 1547->1553 1550->1551 1556 7ff79b5ca8d1-7ff79b5ca8df 1551->1556 1557 7ff79b5ca96c-7ff79b5ca977 1551->1557 1552->1553 1561 7ff79b5ca92d-7ff79b5ca94f 1552->1561 1553->1546 1553->1547 1556->1541 1559 7ff79b5ca711-7ff79b5ca76b 1557->1559 1560 7ff79b5ca97d-7ff79b5ca98d 1557->1560 1559->1470 1560->1559 1561->1470 1562 7ff79b5ca955-7ff79b5ca967 1561->1562 1562->1470
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: )Xz8$displayName
      • API String ID: 0-357724972
      • Opcode ID: fe3f1ff0a748ed67f54c917ba294a37424a07db2c7345f202189c5ab6f36906e
      • Instruction ID: 5e2df9ed0473721e69dae60ddd7eb7801ca11a5ae9f475ecb1fc017be44ea12c
      • Opcode Fuzzy Hash: fe3f1ff0a748ed67f54c917ba294a37424a07db2c7345f202189c5ab6f36906e
      • Instruction Fuzzy Hash: 46724736608BC685E770DB29E4403AAB7A5F784780F904236DACD43B6AEF7CD145DB60

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1564 7ff79b603ea0-7ff79b603eeb CoCreateInstance 1565 7ff79b603fb3-7ff79b603fd3 1564->1565 1566 7ff79b603ef1-7ff79b603ef9 1564->1566 1572 7ff79b603fd5 1565->1572 1573 7ff79b603fdb 1565->1573 1567 7ff79b603eff-7ff79b603f4b call 7ff79b6038b0 1566->1567 1568 7ff79b603fde-7ff79b603fe5 1566->1568 1576 7ff79b603f51-7ff79b603f59 1567->1576 1577 7ff79b603fe7-7ff79b604007 1567->1577 1570 7ff79b604030-7ff79b60403f 1568->1570 1572->1573 1573->1568 1578 7ff79b604012-7ff79b604015 1576->1578 1579 7ff79b603f5f-7ff79b603f62 1576->1579 1585 7ff79b60400f 1577->1585 1586 7ff79b604009 1577->1586 1583 7ff79b604020-7ff79b604023 1578->1583 1584 7ff79b604017 1578->1584 1581 7ff79b603f64 1579->1581 1582 7ff79b603f6d-7ff79b603fa4 CoSetProxyBlanket 1579->1582 1581->1582 1587 7ff79b604040-7ff79b604060 1582->1587 1588 7ff79b603faa-7ff79b603fb1 1582->1588 1589 7ff79b604027-7ff79b60402a 1583->1589 1584->1583 1585->1578 1586->1585 1591 7ff79b604062 1587->1591 1592 7ff79b604068-7ff79b604077 1587->1592 1588->1589 1589->1570 1591->1592 1592->1589
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: BlanketCreateInstanceProxy
      • String ID:
      • API String ID: 1899829610-0
      • Opcode ID: acf6bd0c892b612b348f04173410bdd55c9ad7cbf3cb3b830db0f8ae3fe0ae8d
      • Instruction ID: a36d77ad2952af3ca4b612cd11ad8dfe13d64a5ecd29bdfa4bdb087fa5b389ca
      • Opcode Fuzzy Hash: acf6bd0c892b612b348f04173410bdd55c9ad7cbf3cb3b830db0f8ae3fe0ae8d
      • Instruction Fuzzy Hash: 5E518C3260878182EB249F66E45472AE7B1FB89B94F444039EA9E07BA4DFBDE144C710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID:
      • API String ID: 31276548-0
      • Opcode ID: 8ddbfba276a8db6d010f62b9b4af3f610ce4cd0276d0623fc1a76c6ad882785f
      • Instruction ID: 72580d25a3d092c8095a4bf2c288ff79bae5254c12dd7166d18bfd0bb1827655
      • Opcode Fuzzy Hash: 8ddbfba276a8db6d010f62b9b4af3f610ce4cd0276d0623fc1a76c6ad882785f
      • Instruction Fuzzy Hash: 55E2B732A0DBC990EA75AB79E4443B9B3A0FB44754F848231DA9D077A6DF3CE685C710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2093 7ff79b5fe4e0-7ff79b5fe53d 2094 7ff79b5fe543-7ff79b5fe561 2093->2094 2095 7ff79b5fec5b-7ff79b5fec5e 2093->2095 2096 7ff79b5fed00-7ff79b5fed11 2094->2096 2097 7ff79b5fe567-7ff79b5fe5b8 2094->2097 2098 7ff79b5fec92-7ff79b5feca4 2095->2098 2099 7ff79b5fecef-7ff79b5fecf2 2095->2099 2100 7ff79b5fef79-7ff79b5fef9c 2096->2100 2101 7ff79b5fe657-7ff79b5fe6ae 2097->2101 2102 7ff79b5fed16-7ff79b5fed2e 2098->2102 2103 7ff79b5feca6-7ff79b5fecc1 call 7ff79b5fc8f0 2098->2103 2099->2094 2099->2096 2104 7ff79b5fe6b4-7ff79b5fe6ee call 7ff79b5ff1d0 2101->2104 2105 7ff79b5fe7e3-7ff79b5fe7ee 2101->2105 2102->2100 2106 7ff79b5fed34-7ff79b5fed63 2102->2106 2114 7ff79b5fefd9-7ff79b5fefdb 2103->2114 2115 7ff79b5fecc7-7ff79b5fecea 2103->2115 2118 7ff79b5fe6f1-7ff79b5fe707 2104->2118 2109 7ff79b5fe820-7ff79b5fe878 call 7ff79b5fc8f0 2105->2109 2110 7ff79b5fe7f0-7ff79b5fe800 call 7ff79b5ed620 2105->2110 2106->2100 2109->2114 2124 7ff79b5fe87e-7ff79b5fe94d 2109->2124 2119 7ff79b5fe805-7ff79b5fe810 2110->2119 2115->2100 2121 7ff79b5fe709-7ff79b5fe729 2118->2121 2122 7ff79b5fe738-7ff79b5fe744 2118->2122 2119->2109 2123 7ff79b5fe953-7ff79b5fea53 2119->2123 2121->2122 2125 7ff79b5fe760-7ff79b5fe76c 2121->2125 2122->2105 2126 7ff79b5fe74a-7ff79b5fe758 2122->2126 2131 7ff79b5fea59-7ff79b5febdd call 7ff79b600830 call 7ff79b608510 2123->2131 2124->2123 2124->2131 2129 7ff79b5fe772-7ff79b5fe7ae GetProcessTimes 2125->2129 2130 7ff79b5fe5c0-7ff79b5fe615 call 7ff79b600830 2125->2130 2126->2118 2133 7ff79b5fe7b6-7ff79b5fe7dd 2129->2133 2135 7ff79b5fe61a-7ff79b5fe62d 2130->2135 2139 7ff79b5fe632-7ff79b5fe651 2131->2139 2143 7ff79b5febe3-7ff79b5fec07 2131->2143 2133->2105 2133->2130 2135->2139 2139->2098 2139->2101 2145 7ff79b5fec16-7ff79b5fec56 call 7ff79b608510 2143->2145 2146 7ff79b5fec09-7ff79b5fec11 call 7ff79b5ff350 2143->2146 2145->2139 2146->2145
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e20ed218b6072186f373a84e4480aca5caae367a19d67e10004bd9e8ac1d61dd
      • Instruction ID: 426a9587f882838b3ba85f03cb6311f67fa3e68ff01e66df7ee4df577591a1e3
      • Opcode Fuzzy Hash: e20ed218b6072186f373a84e4480aca5caae367a19d67e10004bd9e8ac1d61dd
      • Instruction Fuzzy Hash: 7DF17F32619BC581E6719B29E4413AAF3A4FBC9794F408226DBDD13BA9EF3CD185C700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2150 7ff79b6038b0-7ff79b6038c3 2151 7ff79b6038c5-7ff79b6038d3 2150->2151 2152 7ff79b6038da-7ff79b6038dc 2150->2152 2153 7ff79b6038d5-7ff79b6038d8 2151->2153 2154 7ff79b6038e1-7ff79b6038f0 2151->2154 2155 7ff79b603b37-7ff79b603b4a 2152->2155 2156 7ff79b603937 2153->2156 2157 7ff79b6038f2-7ff79b603901 2154->2157 2158 7ff79b60392c-7ff79b603935 2154->2158 2161 7ff79b60393a-7ff79b603976 2156->2161 2159 7ff79b603b54-7ff79b603b65 2157->2159 2160 7ff79b603907-7ff79b603925 2157->2160 2158->2156 2159->2156 2165 7ff79b603b6b-7ff79b603b8a 2159->2165 2160->2156 2162 7ff79b603927 2160->2162 2163 7ff79b60397c-7ff79b603991 call 7ff79b5fc8f0 2161->2163 2164 7ff79b603b98-7ff79b603b9a 2161->2164 2162->2165 2163->2164 2168 7ff79b603997-7ff79b6039b7 2163->2168 2165->2161 2169 7ff79b6039d0-7ff79b6039d4 2168->2169 2170 7ff79b603a60-7ff79b603a67 2169->2170 2171 7ff79b6039da-7ff79b6039dd 2169->2171 2172 7ff79b6039c0-7ff79b6039cd 2170->2172 2173 7ff79b603a6d-7ff79b603a95 call 7ff79b617540 2170->2173 2174 7ff79b6039e3-7ff79b6039ea 2171->2174 2175 7ff79b603ae0-7ff79b603aed 2171->2175 2172->2169 2173->2172 2179 7ff79b6039ec-7ff79b6039f6 2174->2179 2180 7ff79b6039fa-7ff79b603a0d 2174->2180 2177 7ff79b603aef-7ff79b603af6 2175->2177 2178 7ff79b603b4b-7ff79b603b50 2175->2178 2177->2164 2186 7ff79b603afc-7ff79b603b0a SysAllocStringLen 2177->2186 2183 7ff79b603b25-7ff79b603b2e 2178->2183 2184 7ff79b603b52 2178->2184 2179->2172 2187 7ff79b6039f8 2179->2187 2181 7ff79b603a0f-7ff79b603a21 2180->2181 2182 7ff79b603a4a-7ff79b603a57 2180->2182 2188 7ff79b603a23-7ff79b603a46 2181->2188 2189 7ff79b603a9a-7ff79b603aad 2181->2189 2182->2170 2183->2155 2184->2155 2186->2164 2190 7ff79b603b10-7ff79b603b1e 2186->2190 2187->2173 2188->2170 2191 7ff79b603a48 2188->2191 2189->2170 2192 7ff79b603aaf-7ff79b603ad8 2189->2192 2195 7ff79b603b20-7ff79b603b23 2190->2195 2196 7ff79b603b8f 2190->2196 2191->2192 2192->2172 2194 7ff79b603ade 2192->2194 2194->2173 2195->2155 2195->2183 2196->2164
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e152d5662d0fb0e68c0764394f1cbd43376677d05d20af6a0daabe223fc67d1a
      • Instruction ID: 7e577f9f2bdac3ecbcda97832279c0e7292c01d816990df230dc90801bd30848
      • Opcode Fuzzy Hash: e152d5662d0fb0e68c0764394f1cbd43376677d05d20af6a0daabe223fc67d1a
      • Instruction Fuzzy Hash: 32616062F1C99945F778663B8400239EAA2FB48799F84423DDA7E567E0EE7CF6019310
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 150e05529de9a47decf7011828f2922322ab90752f283b24ac8fafaaeb1c64ab
      • Instruction ID: 3149f207111018c09a35b538d323f5565688c37ea4e8f9d9e2acfd5506d69a23
      • Opcode Fuzzy Hash: 150e05529de9a47decf7011828f2922322ab90752f283b24ac8fafaaeb1c64ab
      • Instruction Fuzzy Hash: 7F827D32A0CBC581E7719B29E4403AAE7A1FB88784F848136DACD53B65DF7DD545CB20
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 23ba6eead849c7d70aa50872f229b096cc26cd05eb31d5fceafe6cfd5b2ed5e1
      • Instruction ID: 4b56c19280fdd3a8a020f73225aa0db34a66d3fb7a55fff5001bc4df3cabc896
      • Opcode Fuzzy Hash: 23ba6eead849c7d70aa50872f229b096cc26cd05eb31d5fceafe6cfd5b2ed5e1
      • Instruction Fuzzy Hash: B452B432608BC685E7709F25E4403AABBA5FB88B80F548135DE8D47B66DF3CD541D7A0
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b15de5670759005e0ed4d4cea0dfb387e0e39924642495fda01a1bff4a4e5381
      • Instruction ID: 969f97b334e42fdf828449b48c21fa2fff5c82bffa48e2b58ee4ae4b681a9f9f
      • Opcode Fuzzy Hash: b15de5670759005e0ed4d4cea0dfb387e0e39924642495fda01a1bff4a4e5381
      • Instruction Fuzzy Hash: 2512E422A18B8981E7309B7BA44036AE7A1FF45784F844236DF9E577A4EF7CE644D310
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7d257c48302bf39c7ad8e21cec5641c4bbbbef047a6bdca7dc9039a0f7a3cadc
      • Instruction ID: 5ff1a380e878c489e901e1ed4b2781429c3f45225da496dccb9d2e841a6778f1
      • Opcode Fuzzy Hash: 7d257c48302bf39c7ad8e21cec5641c4bbbbef047a6bdca7dc9039a0f7a3cadc
      • Instruction Fuzzy Hash: 5502C773709A8981EA74DB29E0403B9E3A2FB96BD4F944139DA6D073A4DF2CF5918710
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 595b21c1fcd76a915b5d1ecc9e987e6060189e26ab77d64882c617a4fc6a5efd
      • Instruction ID: c2293516e998b08764446c06e3806d5be711096d9437ba0dce800376ae9072d6
      • Opcode Fuzzy Hash: 595b21c1fcd76a915b5d1ecc9e987e6060189e26ab77d64882c617a4fc6a5efd
      • Instruction Fuzzy Hash: F6C1B032A08BC981E7A0AB35E4453AAF768FB84794F804236EE8D437A5DF7CE545C710
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 46258950f8a9e35c8f271ef8df25ab72abaeec2d11d5215eba3c3f253b4087e6
      • Instruction ID: 3fdad661088166360e79c68a6624963184d1b0f6ddf6b961d46c064c5898285a
      • Opcode Fuzzy Hash: 46258950f8a9e35c8f271ef8df25ab72abaeec2d11d5215eba3c3f253b4087e6
      • Instruction Fuzzy Hash: 34513412A0C68596FB305B7DA40037BAB51E799388F845234EE9D16BDBCB3CD3818B10
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e74abc28a9934be97c76c28382e64665b2a20f3cc1c99e5274815624e5541ce6
      • Instruction ID: 78234008f9d14a00049f848b70a9fbb2a6e70759ad9dafb4423db31af7de2737
      • Opcode Fuzzy Hash: e74abc28a9934be97c76c28382e64665b2a20f3cc1c99e5274815624e5541ce6
      • Instruction Fuzzy Hash: 07319461A0970541FB75ABB7E45032AA662FF88B94F844131DE9E46BB4DF3CE6418310

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: GlobalInfoMemoryPerformanceStatus
      • String ID: @
      • API String ID: 3163563144-2766056989
      • Opcode ID: f66579fa515824eb8c19ce635e6e49b1f6598eb70088b4617f090688130509d3
      • Instruction ID: 218d0f2581ca2f8ff539dc64f8001278712dc601de84850b6d5bda854611645d
      • Opcode Fuzzy Hash: f66579fa515824eb8c19ce635e6e49b1f6598eb70088b4617f090688130509d3
      • Instruction Fuzzy Hash: BF616E31A0CAC481E7729B29E4453EAB3B5FB98794F408225EECC477A5DF7DD1898B00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: GlobalInfoMemoryPerformanceStatus
      • String ID: @
      • API String ID: 3163563144-2766056989
      • Opcode ID: ff63be0607a300fd3d67ce4ea1dec3bf6161dc8a60ff5ab0c0ebb708d9dd3e72
      • Instruction ID: 0ad8b1dde2a1e40e3fe66b1886e58fb5ca8dff2ada766c8f400a2299cfed3660
      • Opcode Fuzzy Hash: ff63be0607a300fd3d67ce4ea1dec3bf6161dc8a60ff5ab0c0ebb708d9dd3e72
      • Instruction Fuzzy Hash: 4A215411A18EC492E6325B39B4063E6A3B5FFE8769F405311FADC46764DF3ED25A8B00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1594 7ff79b603dd0-7ff79b603de5 CoInitializeEx 1595 7ff79b603e5d-7ff79b603e7d 1594->1595 1596 7ff79b603de7-7ff79b603e26 CoInitializeSecurity 1594->1596 1602 7ff79b603e85-7ff79b603e88 1595->1602 1603 7ff79b603e7f 1595->1603 1597 7ff79b603e58-7ff79b603e5b 1596->1597 1598 7ff79b603e28-7ff79b603e48 1596->1598 1599 7ff79b603e8b-7ff79b603e91 1597->1599 1604 7ff79b603e50-7ff79b603e56 1598->1604 1605 7ff79b603e4a 1598->1605 1602->1599 1603->1602 1604->1597 1604->1602 1605->1604
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Initialize$Security
      • String ID:
      • API String ID: 119290355-0
      • Opcode ID: f88518d493245232a90d0ca39c640deec55fb8999d5a97ebb263f3f7a39ce02d
      • Instruction ID: c7bd7d41dff76c951cee6588dfd3226da0a7e0a8968e0a9102cbaa991300c177
      • Opcode Fuzzy Hash: f88518d493245232a90d0ca39c640deec55fb8999d5a97ebb263f3f7a39ce02d
      • Instruction Fuzzy Hash: BC11843270C68587E7649F39E05432EB7A2FB89B54F904139D6AE47A94DFFCD4048710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1606 7ff79b5ed570-7ff79b5ed593 1608 7ff79b5ed595-7ff79b5ed5cb SetWaitableTimer 1606->1608 1609 7ff79b5ed5f6-7ff79b5ed605 1606->1609 1610 7ff79b5ed5ed 1608->1610 1611 7ff79b5ed5cd-7ff79b5ed5e9 CloseHandle 1608->1611 1612 7ff79b5ed60f-7ff79b5ed617 1609->1612 1610->1609 1611->1612 1614 7ff79b5ed5eb 1611->1614 1614->1609
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandleTimerWaitable
      • String ID:
      • API String ID: 3962215526-0
      • Opcode ID: 5db6cd7dbc55d306c9cb86994fc80ce26182e05a7e9292f79ba0a0c004947414
      • Instruction ID: 51096bf6d3ae261ebf8398045dee8634a0559bc409a47589feed68f7a1d0824a
      • Opcode Fuzzy Hash: 5db6cd7dbc55d306c9cb86994fc80ce26182e05a7e9292f79ba0a0c004947414
      • Instruction Fuzzy Hash: 69012B22B0C75242FB74AB79764473992519F8ABF4F585231ED9F06BE0EF7C95418310

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2197 7ff79b5fabb0-7ff79b5fabd8 call 7ff79b5fc8f0 2200 7ff79b5fac84-7ff79b5facb4 2197->2200 2201 7ff79b5fabde-7ff79b5fac16 CreateThread 2197->2201 2202 7ff79b5facb6-7ff79b5facb9 2200->2202 2203 7ff79b5facf0-7ff79b5facff 2200->2203 2204 7ff79b5fac18-7ff79b5fac25 2201->2204 2205 7ff79b5fac77-7ff79b5fac83 2201->2205 2202->2203 2210 7ff79b5facbb-7ff79b5facc5 2202->2210 2208 7ff79b5fad05-7ff79b5fad08 2203->2208 2209 7ff79b5fad8b-7ff79b5fad92 2203->2209 2206 7ff79b5fac2c-7ff79b5fac31 2204->2206 2207 7ff79b5fac27 2204->2207 2213 7ff79b5fac33-7ff79b5fac38 2206->2213 2214 7ff79b5fac50-7ff79b5fac72 2206->2214 2207->2206 2215 7ff79b5fad0e-7ff79b5fad17 2208->2215 2216 7ff79b5fad0a 2208->2216 2217 7ff79b5fad94-7ff79b5fad99 2209->2217 2218 7ff79b5fadb7-7ff79b5fadc4 2209->2218 2211 7ff79b5faccc-7ff79b5facd1 2210->2211 2212 7ff79b5facc7 2210->2212 2211->2203 2219 7ff79b5facd3-7ff79b5facd8 2211->2219 2212->2211 2220 7ff79b5fac3e-7ff79b5fac47 2213->2220 2221 7ff79b5fac3a 2213->2221 2214->2205 2222 7ff79b5fad30-7ff79b5fad36 2215->2222 2223 7ff79b5fad19-7ff79b5fad24 2215->2223 2216->2215 2217->2218 2224 7ff79b5fad9b-7ff79b5fadb0 2217->2224 2225 7ff79b5facde-7ff79b5face7 2219->2225 2226 7ff79b5facda 2219->2226 2220->2214 2221->2220 2229 7ff79b5fad46-7ff79b5fad4b 2222->2229 2230 7ff79b5fad38-7ff79b5fad3c 2222->2230 2223->2222 2228 7ff79b5fad26 2223->2228 2224->2218 2225->2203 2226->2225 2228->2222 2229->2209 2232 7ff79b5fad4d-7ff79b5fad54 2229->2232 2230->2229 2231 7ff79b5fad3e-7ff79b5fad41 call 7ff79b5e92b0 2230->2231 2231->2229 2232->2209 2234 7ff79b5fad56-7ff79b5fad60 2232->2234 2236 7ff79b5fad62 2234->2236 2237 7ff79b5fad67-7ff79b5fad6c 2234->2237 2236->2237 2237->2209 2238 7ff79b5fad6e-7ff79b5fad73 2237->2238 2239 7ff79b5fad75 2238->2239 2240 7ff79b5fad79-7ff79b5fad82 2238->2240 2239->2240 2240->2209
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateThread
      • String ID:
      • API String ID: 2422867632-0
      • Opcode ID: 2ff2c8b286826e5516feed3dbba27ad81796813e88e7ad288488bd867b4079f2
      • Instruction ID: 13422c6b998c19563f4d61160dbdf5fb4eb7ecb3f6772138b11459c97aa1d67a
      • Opcode Fuzzy Hash: 2ff2c8b286826e5516feed3dbba27ad81796813e88e7ad288488bd867b4079f2
      • Instruction Fuzzy Hash: 6551C122A09A4941FB25BB36A545379E3B1EB49BD4F888432CE4D473A5DF3CF582C321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: MemoryProcessRead
      • String ID:
      • API String ID: 1726664587-0
      • Opcode ID: 4743f90d9d2520b8c4eb278a2a920ad7924d2612e7467c0a97978b18db0644eb
      • Instruction ID: b75d91bc1ba6a1574864b27bb32f7548b77d2890f9595499b90d7ec227cfcaeb
      • Opcode Fuzzy Hash: 4743f90d9d2520b8c4eb278a2a920ad7924d2612e7467c0a97978b18db0644eb
      • Instruction Fuzzy Hash: 6521A122A0974582E630AF63BC40676E2A5BF59794F844135DEEE477E0EF3CE146C310
      APIs
      • RtlReAllocateHeap.NTDLL(00000008,00000007,?,00007FF79B615FE5), ref: 00007FF79B5EC18D
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: b2411dfa02787bc603a01eb649d5b4a5a60a521f2a24bae5779887938f447398
      • Instruction ID: cb3469d4b73dda32daf27b6fe00f2ab9b683e742bc7373096df1a28d6c6659ee
      • Opcode Fuzzy Hash: b2411dfa02787bc603a01eb649d5b4a5a60a521f2a24bae5779887938f447398
      • Instruction Fuzzy Hash: F011E922B0E79951FA7D7BB9A90537DD2916F09B80F884035E94D467A2EF2CE652C220
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID:
      • API String ID: 621844428-0
      • Opcode ID: 30391d8d47721795ab59ac410902cc69d25f778c9431a1c8d530fe638f5e64df
      • Instruction ID: 985f9ab4f66d75d0618a0881c9f05673bc221e4a3733349cf96d2ecbd23fdf9e
      • Opcode Fuzzy Hash: 30391d8d47721795ab59ac410902cc69d25f778c9431a1c8d530fe638f5e64df
      • Instruction Fuzzy Hash: DBA01128A0C28C80E23C33B008820280320EB08208FA00C38C30B0AC00AC3CB0208202
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$-$-$-$-$<$INFINITY$NAN
      • API String ID: 0-3578884141
      • Opcode ID: e2d025e8b6aaef88e8e7794292e033d83f46989fde1848608565b2ba240bb3df
      • Instruction ID: 5f2545ef2a5b1e9eefc49fff8db3d0c79f38cf30bdc4934a8e61072f93cc0d82
      • Opcode Fuzzy Hash: e2d025e8b6aaef88e8e7794292e033d83f46989fde1848608565b2ba240bb3df
      • Instruction Fuzzy Hash: 18C12452E0C28E41FA71AA3C9450779D691AFC1794FD44331E96E962F3DE2CEB82C320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: \\$\u$\u${${$}$}
      • API String ID: 0-2980962117
      • Opcode ID: 8256eeaabef511d92e5491677e1ed20858fa496dee4dead44c7d1ac2bab1d74a
      • Instruction ID: 96135b83392c1d735623dd250b50110750bff6fbfed1f65d01d8c124eaa083bb
      • Opcode Fuzzy Hash: 8256eeaabef511d92e5491677e1ed20858fa496dee4dead44c7d1ac2bab1d74a
      • Instruction Fuzzy Hash: 2E226D22B2C29546E770973CA014B7DEB50AB96780FC45335DBAA03BF2DA7DD241CB21
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$-$-$INFINITY$NAN
      • API String ID: 0-176520682
      • Opcode ID: 08c4ac74b2e9087afa3caa994616b205f3fb00dee2a80684ec7a029f88502482
      • Instruction ID: d50a68508b2403ab89d0fa046abbb2df4525c55abeb751e44fd83be6a685dc82
      • Opcode Fuzzy Hash: 08c4ac74b2e9087afa3caa994616b205f3fb00dee2a80684ec7a029f88502482
      • Instruction Fuzzy Hash: 22C12562E0C18F41FA71A63D94407B9D692AFC5790FD84331E96D962F7DE2CEB858320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: +$-$-$FFFFFFFF$FFFFFFFF$d
      • API String ID: 0-1053537561
      • Opcode ID: 290c4ad1f2cdacd5159f2fbb13d04470b37c2860c490bb957fbc599138ae94c4
      • Instruction ID: fcc2847ab323b40242c8f494f447db44a67332c0ad8ef30a9d205d8d60360310
      • Opcode Fuzzy Hash: 290c4ad1f2cdacd5159f2fbb13d04470b37c2860c490bb957fbc599138ae94c4
      • Instruction Fuzzy Hash: 47B15E12F086AA42EB749A3985407B9D690EB91BE0FC95331DE7D077F2EA3D9745C320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: \?\\$]?\\$p
      • API String ID: 0-4214730228
      • Opcode ID: 0cfa5353c5ea8ee4b3afac2aad02d836db88223c8cc823e4bcdb008981f8fbc9
      • Instruction ID: ee1ed828854f0d0d96d33e5a945d2fe1211429d8c8c134ebb2633dcdb4a9301d
      • Opcode Fuzzy Hash: 0cfa5353c5ea8ee4b3afac2aad02d836db88223c8cc823e4bcdb008981f8fbc9
      • Instruction Fuzzy Hash: E583C472A0CAC681F671AB29E4453FAE7A1FB84784F844135CA9D07BA6DF7CE641C710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: e55d08f35ef4205ec82b2a75c71248a8fe86c66ca27525e454d94af99a3b3ee2
      • Instruction ID: f9581915a275e3535427005dd0c384917a557b2c8ecea1c0176de0a04507c579
      • Opcode Fuzzy Hash: e55d08f35ef4205ec82b2a75c71248a8fe86c66ca27525e454d94af99a3b3ee2
      • Instruction Fuzzy Hash: C3822522E19BC581EA11DB3D95013B9A761F799B98F489335DEAD077A2DF38E2C5C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 4355bae096057e50d2014b578a9260b6cd19d9d4e24e4dc0a8e1e8b08e75cf61
      • Instruction ID: 9b3b0cab072443e1d9ef84eb1bd80aa603a813c8dd24fc100c6a021210406450
      • Opcode Fuzzy Hash: 4355bae096057e50d2014b578a9260b6cd19d9d4e24e4dc0a8e1e8b08e75cf61
      • Instruction Fuzzy Hash: 982228A2B14B8941EB14DFBDA41056AA322E795BE8F908335DE7E537E5EE3CD241C310
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 7cb9b4d98ccda9723f8f4660f169c8e332840f2ede50715670aadf476a0c8cce
      • Instruction ID: 3294722a241460e3f7d1997568dcd58c8b0e5d2a8e9e105b470704a4a974c2f8
      • Opcode Fuzzy Hash: 7cb9b4d98ccda9723f8f4660f169c8e332840f2ede50715670aadf476a0c8cce
      • Instruction Fuzzy Hash: CE1225A2B18B8942EA24DF7DA401579A762EB85BE0F809331DE7E173D5EE3CD241C310
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 6947f1cee470faa4cdf3a6d8b2dafcf5b09b3bd34de1fbcc644852bbefc17106
      • Instruction ID: 08618f90be8dcc67c6934cc602fc46817b50196c6eafd5d0f3bde4ac9dbc530d
      • Opcode Fuzzy Hash: 6947f1cee470faa4cdf3a6d8b2dafcf5b09b3bd34de1fbcc644852bbefc17106
      • Instruction Fuzzy Hash: AF3104E6B08B8042FE54D7A4786636B9212A7457D0F90E136EE4D9BB1EDE2DD2524240
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$modnarod$setybdet$uespemos
      • API String ID: 0-66988881
      • Opcode ID: 2faa1e7bddfd4a4b7a4b3a994d4568f60231760a0d3cce199580143a4246c37e
      • Instruction ID: d012a7bd8e6c6cd2a05a1bef8813e5da26a88e9d37689818a4a4a611dac92a1b
      • Opcode Fuzzy Hash: 2faa1e7bddfd4a4b7a4b3a994d4568f60231760a0d3cce199580143a4246c37e
      • Instruction Fuzzy Hash: 9921F6E6B08B8442FE44DBE4787236B9262A3847C0F90E036EE4D9BB1EDF3DD2514640
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: $ $
      • API String ID: 0-3665324030
      • Opcode ID: db7a508e94bdf8f9997b44ddcf67811d23d34a3a787e0c700a592f959762f252
      • Instruction ID: b6f5d61f1ef622c37056a32a11941b17dcf9823a0688d4e1968128bc2414c906
      • Opcode Fuzzy Hash: db7a508e94bdf8f9997b44ddcf67811d23d34a3a787e0c700a592f959762f252
      • Instruction Fuzzy Hash: E5E2AE2250C6C589E3329B28A4113EBFBA0FB96355F485215EBD843B9BDB3DD245CF21
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: Authenti$GenuineI$HygonGen
      • API String ID: 0-696657513
      • Opcode ID: 9e16304ba3a2dcdac91fc0758f19f2924e920473741a837e8d0d246b663292cb
      • Instruction ID: 06b341ceddcfe2078b4928aa2fc7e93be5b7e1108d654f1b915e2f4038d0d16c
      • Opcode Fuzzy Hash: 9e16304ba3a2dcdac91fc0758f19f2924e920473741a837e8d0d246b663292cb
      • Instruction Fuzzy Hash: 28B18DA373859503FB298A16BD62BB68882B398BC4F547038ED6F47BC0D87DDA10C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: @$YY
      • API String ID: 0-1978995999
      • Opcode ID: 3ed37ff33acd59d20c0969d9ce25bc50e7935f08c18583c7e91549f3e059e4a3
      • Instruction ID: e25d039364d63f4864ce2f9cc089674690e638885ea5deaaf33d60aa4b45f94f
      • Opcode Fuzzy Hash: 3ed37ff33acd59d20c0969d9ce25bc50e7935f08c18583c7e91549f3e059e4a3
      • Instruction Fuzzy Hash: C8628B72609BC581E7319B69E4403EAE7A1FBC8784F844225DB9C47BAADF3DD245CB10
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: arenegyl$setybdet
      • API String ID: 0-2199462733
      • Opcode ID: d1deb405a1ac6d8e5e7f4d69b027dce16a40360db0b6ab4ec5e8d6b35c0f521c
      • Instruction ID: f03cd3f3dfe6ddec2c2e74d2b43ed7fc11fd7d542db2be90de8e8f0b11523bb7
      • Opcode Fuzzy Hash: d1deb405a1ac6d8e5e7f4d69b027dce16a40360db0b6ab4ec5e8d6b35c0f521c
      • Instruction Fuzzy Hash: 9D513B23B456A185F2A5AF79BA503E76A20F318758FC85125DE9C97312EF38DBD28340
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2ba4dac0f2cb26b8aa1b909e524662218185859aa08e573711014e98f35a3341
      • Instruction ID: 095f215b143d03349b29e9512fd317ac62ea02a0eac6c0f67701657268b7e41c
      • Opcode Fuzzy Hash: 2ba4dac0f2cb26b8aa1b909e524662218185859aa08e573711014e98f35a3341
      • Instruction Fuzzy Hash: B7D2B4A7F45AD043FA60CFE474607D7AB61FB95788F84A026DE8C93B09DE38C6918744
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: x
      • API String ID: 0-2363233923
      • Opcode ID: 056227384fc1d0bca13c851cd0e90f4fad648ba9479344d0f84e7a4a578128ff
      • Instruction ID: ab461bd13186e4b587c6d4d193a4ce12f62fb261cb54a1d075773d12e53766c4
      • Opcode Fuzzy Hash: 056227384fc1d0bca13c851cd0e90f4fad648ba9479344d0f84e7a4a578128ff
      • Instruction Fuzzy Hash: 49029336619FC984D6B18B19F4803DAB3A4F799794F548226DECC53B29EF78D198CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 29400a28f473858c008f70bf6a50044e729f480534161aaa0e4c200521b43fca
      • Instruction ID: 5e3f5662e074d03489bb33086bea047450885cb6fc3e9e22337037ce218de00e
      • Opcode Fuzzy Hash: 29400a28f473858c008f70bf6a50044e729f480534161aaa0e4c200521b43fca
      • Instruction Fuzzy Hash: 1C825B66F2C7A941E736573990057B8A650AFA2790FC0D336EDA932BF2DB2DD6418310
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 233ca5f7483577dbae9ba00345ac0d0481753ab71fb3b58890115500f7226d49
      • Instruction ID: bc484aac207c28c51a4f92567b44fc5e938aa61523705ab6d19cccb44c428966
      • Opcode Fuzzy Hash: 233ca5f7483577dbae9ba00345ac0d0481753ab71fb3b58890115500f7226d49
      • Instruction Fuzzy Hash: 56B29722908BC4C1E6629F28E50A7EAB374FF98794F459225DF9C13766EF35E295C300
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cd37ab8ad13da011343cc5e71afc9166652a90feea944002a348182a40d829cb
      • Instruction ID: 6d219ce0c41fe51439f690a97b619cbd3ef967980453d95944b857d51fec42f9
      • Opcode Fuzzy Hash: cd37ab8ad13da011343cc5e71afc9166652a90feea944002a348182a40d829cb
      • Instruction Fuzzy Hash: D862F332A1CB8981E7719B28E4403AAB3A1FB85344FD04235EADD07BA5DF7DD685CB10
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6190de9d9478defea951e1bcaefbe87422a3107e16f8b4cd4c4a73d5ec96d70e
      • Instruction ID: ca2d868a1405536231ab61ef2b97a6cd5d72d9f579004cc3ad1325c5102960f2
      • Opcode Fuzzy Hash: 6190de9d9478defea951e1bcaefbe87422a3107e16f8b4cd4c4a73d5ec96d70e
      • Instruction Fuzzy Hash: 01522632A1CB8982E7719B24E44139AF3A0FB85794F944231DADD07BA9DFBDD645CB00
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a3454728ca14697284f12703e0deb4816cfae1497675634ae9ce4f69d844b57f
      • Instruction ID: c98dd7561553ab92871933d9b9a13f395c4306d3b194ae0d33cc930042e9b869
      • Opcode Fuzzy Hash: a3454728ca14697284f12703e0deb4816cfae1497675634ae9ce4f69d844b57f
      • Instruction Fuzzy Hash: 313249A2B1C69941E671EAB9A402BB9D713EB157C4FC44231EE4E536A2DF3CE741C320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1d90326dc552e53659cd53f31c33f5cd564d50ea99120fcc9de3824a803d5a60
      • Instruction ID: 7344854ff75bbf88e09a0486d12e66fe795da8391511813663c1bab91d0ba221
      • Opcode Fuzzy Hash: 1d90326dc552e53659cd53f31c33f5cd564d50ea99120fcc9de3824a803d5a60
      • Instruction Fuzzy Hash: 99127C62E0C7E964F7729EBC9400779EA91A711794FD44230CA6D172F2CB7D9B91D320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 28dd6c73e7ec9352fd15d59bd35d4569b700479e1819d48eea2ef6c163527b82
      • Instruction ID: 3766a11d8da8f2e02a340ebec604d21d7959279333bff3ec0ebcfae270a28c33
      • Opcode Fuzzy Hash: 28dd6c73e7ec9352fd15d59bd35d4569b700479e1819d48eea2ef6c163527b82
      • Instruction Fuzzy Hash: 58F1486271468C87EA24EF79A50426AE755F780BD0FC49236EF5D53BA9CE3CDA41C700
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d361f32d3ccbfb2a5e790d7b5b844845b25fd29db8b2791c9a30abba27a08abb
      • Instruction ID: 074e565b1f6127acd9c75f29a02625e9fa58a8d5b4c0d63b2507454df3cf86a2
      • Opcode Fuzzy Hash: d361f32d3ccbfb2a5e790d7b5b844845b25fd29db8b2791c9a30abba27a08abb
      • Instruction Fuzzy Hash: EF02FB21A1974581E971BB3A94447B9A762FF49FE0FD40236CE6D573E1DE3CE9418320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a72ba0b5b283ee9356152887faa16dba0867498997822c8ddb97be702d1ecf8e
      • Instruction ID: 2e52eeac747aa64ea5fc693c5fab2f81e21fa174d5cc9ef4edb851f8e790f930
      • Opcode Fuzzy Hash: a72ba0b5b283ee9356152887faa16dba0867498997822c8ddb97be702d1ecf8e
      • Instruction Fuzzy Hash: 8DE14B53B1929943EE39EA39945437DB283ABC4794FD58631C96E0B7E1DE3CAB46C300
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1082318d30a523d9920de46e4b008ecf9093244ef7e9806513c75d7edf5f7c22
      • Instruction ID: 58899db4e71c443d5653f70cf958a0f761e7c89a9cbb478a8ddc5b7eea214fae
      • Opcode Fuzzy Hash: 1082318d30a523d9920de46e4b008ecf9093244ef7e9806513c75d7edf5f7c22
      • Instruction Fuzzy Hash: D0F12562E29FC556E722573C54023BAF714BFEB7C4F80D322EEE571A92DB6C92418210
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2f3fb0e5124621f4c835e7c073a2f1420a7c2b39ba5bc49f1d6b4e03b2a4dbe9
      • Instruction ID: b8564a810223c83d8a7c3ef958153b5b90180d452c4a018b0892b85fa87090bd
      • Opcode Fuzzy Hash: 2f3fb0e5124621f4c835e7c073a2f1420a7c2b39ba5bc49f1d6b4e03b2a4dbe9
      • Instruction Fuzzy Hash: 3FF1B222A0CB49C1EB60AB2AE40533AFBA1FB45B94F948435DE8D077A5DF7CE581C710
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e6f1be0354c71c00d6fb1417c19f9f1e7f4b1a93c4e19f89986ca0f45dcebd7d
      • Instruction ID: 3a93939f5fe0490b602a637ab0202188609ea924eecf86a1fb0b90561259660e
      • Opcode Fuzzy Hash: e6f1be0354c71c00d6fb1417c19f9f1e7f4b1a93c4e19f89986ca0f45dcebd7d
      • Instruction Fuzzy Hash: BBE18A22B1C66982E7749B2DE0117B9B761EB95794FC05232DA9E07BE2DF3DD201C720
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3c3cf6df0fd2cbe2006baab5f7b3177614ed40735647bc8cb8b5c8600ff777a5
      • Instruction ID: 5e1589d1126e8265170e2216aa57ffc0f49dd187af78fc69c57da152fe37c094
      • Opcode Fuzzy Hash: 3c3cf6df0fd2cbe2006baab5f7b3177614ed40735647bc8cb8b5c8600ff777a5
      • Instruction Fuzzy Hash: DEB10866F81BA443DA188F85B85179AA365B3C9BD4F45E026DE4CA7F58ED3CC9038340
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7825f78816ba6b7963d5898e74609dd6608c24e18cd7cf09bfcc21dbccdea42d
      • Instruction ID: 32c0bf164ab15a8d7fc6a08d022c962f1d306709c7106499b98b3e81d8433909
      • Opcode Fuzzy Hash: 7825f78816ba6b7963d5898e74609dd6608c24e18cd7cf09bfcc21dbccdea42d
      • Instruction Fuzzy Hash: A1E1D722E0CB59A1F770AB69E044739A3A0FB44794F914532DA9D476E6EF7CE681C320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0f0b48da9aebd5065d7660fb9ba3a6be681e91538e5d236ec8c6ff245fe041ca
      • Instruction ID: 099cbb1470dcf5e93f49b8236121d30d86521186617ff3af89bfa51bd2d29065
      • Opcode Fuzzy Hash: 0f0b48da9aebd5065d7660fb9ba3a6be681e91538e5d236ec8c6ff245fe041ca
      • Instruction Fuzzy Hash: DED1E622A1CB8691E7B0AB69E404379E3A1FB457A0F948531DE9D077E5EF7CE581C320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1b366787beaaf91b082340e9bed0080118210868aa35a09c18a4028d25d383aa
      • Instruction ID: 6d7064f3a0131a5cc3907def5fdbc16be3c92461a0f62436688fc3bec16f51fd
      • Opcode Fuzzy Hash: 1b366787beaaf91b082340e9bed0080118210868aa35a09c18a4028d25d383aa
      • Instruction Fuzzy Hash: 8AB12562E1CE4A41EA356A39910A33DE691FF51794F845231DE9F077FAEE7CF2418220
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6d4eb5fc8198994174e0f59611e12d972dbd1cec4e47ab4d2200cd7efbea3555
      • Instruction ID: 8234b2ceec3b63e927c9ae2b272d93c8385f9c1b313ef784093c49dbb65b6ae4
      • Opcode Fuzzy Hash: 6d4eb5fc8198994174e0f59611e12d972dbd1cec4e47ab4d2200cd7efbea3555
      • Instruction Fuzzy Hash: 3BC10372A08A8582F7609B79E44437AA3A1FB88B50F948231DA9E473E5DF7CE585C710
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 339e688796efabe43746cf74638dd5f4d1f027577ae3fc993df8b7b45692e19a
      • Instruction ID: 1bdc7a60a6c7868f5b8c87227af250d65cc07469729ddb01e1340553f73f0b26
      • Opcode Fuzzy Hash: 339e688796efabe43746cf74638dd5f4d1f027577ae3fc993df8b7b45692e19a
      • Instruction Fuzzy Hash: 7C912812F187CA86EA34DB1594543FA9350EBD6784FC49335DEAD02AA6EF6CE1C1CB10
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 36d216c5721e42192dcfacdc266e99e69f5499f0f3e96c036a977c2f55732627
      • Instruction ID: 2e8754f07aeef64b586f1d34ce2fe3026b39040725257ab1fd79bec5135f5b93
      • Opcode Fuzzy Hash: 36d216c5721e42192dcfacdc266e99e69f5499f0f3e96c036a977c2f55732627
      • Instruction Fuzzy Hash: E6A14962B1865981EB349B29E0413B9AB61EB85B94FC05331CEAE077F5DE3CC605C720
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ccab2a99d66cc2938f9e9cf7f09b08a4fc173bb022f96a6bbd7417a97c9ea59e
      • Instruction ID: a639c2e1486c5c5d016c10b1d493ae664f2937765de9acf8dd640b2df8dd0781
      • Opcode Fuzzy Hash: ccab2a99d66cc2938f9e9cf7f09b08a4fc173bb022f96a6bbd7417a97c9ea59e
      • Instruction Fuzzy Hash: EA910962A186A642E7749F29D410739AA92FB44394F808135DF5E07FF2EF7DE6509320
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 48b629ed4bfc7534cb207176db2406fdc61390969b7cbc3d64428b68fcdbc778
      • Instruction ID: cba23589cb93332665ba19325afa18c5b19b31d79c31062f487bbc356c6afa76
      • Opcode Fuzzy Hash: 48b629ed4bfc7534cb207176db2406fdc61390969b7cbc3d64428b68fcdbc778
      • Instruction Fuzzy Hash: 3171E662A09B4981EAA5AF29E4493B8E390FB45FD0F948532CE5D137E5DE7CF690C310
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3a06b26d4aa8c41564e4a5d30be933293e5ee3ce1c554769520e3931c16b4c27
      • Instruction ID: 066f919be67bd74db9a64fe59160c5782d1cb4167fd3047e561f764428203833
      • Opcode Fuzzy Hash: 3a06b26d4aa8c41564e4a5d30be933293e5ee3ce1c554769520e3931c16b4c27
      • Instruction Fuzzy Hash: 8281C461B0D68E81EA65BB3A9806776E3B1BF49BD4F948231DD5E033E1DE3CF5418211
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4406de6052b1dfa045fda81e86efe98fa21a2a8245d1f0c5f783121fe10c89e8
      • Instruction ID: da992d7f952a657f2aef0bd3e671292160c8eb0a2801ced6f7de080ccf05d59c
      • Opcode Fuzzy Hash: 4406de6052b1dfa045fda81e86efe98fa21a2a8245d1f0c5f783121fe10c89e8
      • Instruction Fuzzy Hash: 5C518896F14B8441FE61D77964113BAD311AF957C4F84A336EECD66A16EF3CD2418200
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
      • Instruction ID: 95b49e6827ce9d46257eb7b3719f990cac8925a63aac50d85ca841c6446396d0
      • Opcode Fuzzy Hash: e9b0bec211e6195bb120cdd5099edde79d6a45dd3d239ce56b518f5aae1f642a
      • Instruction Fuzzy Hash: 0D414A72F1462942FB24CB65E561B38A711E350BD0F819132CE5B23BD1CE28EA95C340
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 39ddc778718cc6ea632259082eb1bf6fa5d14d3289086a7d8a4a5544bb637f40
      • Instruction ID: 04a0dc323d8899539a14492220e5c52ed9d0b0c27e3c9750d9541c446af93078
      • Opcode Fuzzy Hash: 39ddc778718cc6ea632259082eb1bf6fa5d14d3289086a7d8a4a5544bb637f40
      • Instruction Fuzzy Hash: A0412771B1974541EA75AB7BA400738A6E2AF48BE0F844635CE7E433E0EE3CF5418720
      Memory Dump Source
      • Source File: 00000000.00000002.2651452164.00007FF79B5C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B5C0000, based on PE: true
      • Associated: 00000000.00000002.2651428654.00007FF79B5C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2651500997.00007FF79B618000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff79b5c0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 778cc65c610f4da9226b95b8a72cac66722f54ed34f6417ec7f4f0ba4ef58a6b
      • Instruction ID: 793f73db46b71fee74793f289346489cd897d6b003180fd94f38592bf825c66b
      • Opcode Fuzzy Hash: 778cc65c610f4da9226b95b8a72cac66722f54ed34f6417ec7f4f0ba4ef58a6b
      • Instruction Fuzzy Hash: BD318BA2F1551E43FF74963D89217B581824F857F0ED48330DE3E8BBE8E92DA2418310