Loading ...

Play interactive tourEdit tour

Analysis Report PI.exe

Overview

General Information

Sample Name:PI.exe
Analysis ID:321388
MD5:dbda32339a6965fefc794f220f944016
SHA1:3e53b09125eb1e031f5f0e777836ba738b84fc42
SHA256:c62b96f303f538748543747d1dacb97119dd9826b53ef6c8350b5b24d69f0006
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
.NET source code contains potential unpacker
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Delayed program exit found
Drops VBS files to the startup folder
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PI.exe (PID: 6512 cmdline: 'C:\Users\user\Desktop\PI.exe' MD5: DBDA32339A6965FEFC794F220F944016)
    • notepad.exe (PID: 1476 cmdline: C:\Windows\system32\notepad.exe MD5: D693F13FE3AA2010B854C4C60671B8E2)
    • PI.exe (PID: 5152 cmdline: 'C:\Users\user\Desktop\PI.exe' MD5: DBDA32339A6965FEFC794F220F944016)
    • PI.exe (PID: 4600 cmdline: 'C:\Users\user\Desktop\PI.exe' 2 5152 5197828 MD5: DBDA32339A6965FEFC794F220F944016)
  • wscript.exe (PID: 6776 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • PI.exe (PID: 6744 cmdline: 'C:\Users\user\Desktop\PI.exe' MD5: DBDA32339A6965FEFC794F220F944016)
      • notepad.exe (PID: 6636 cmdline: C:\Windows\system32\notepad.exe MD5: D693F13FE3AA2010B854C4C60671B8E2)
      • PI.exe (PID: 6728 cmdline: 'C:\Users\user\Desktop\PI.exe' MD5: DBDA32339A6965FEFC794F220F944016)
      • PI.exe (PID: 6788 cmdline: 'C:\Users\user\Desktop\PI.exe' 2 6728 5209890 MD5: DBDA32339A6965FEFC794F220F944016)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "l6qpC", "URL: ": "https://xmFob4yUwp.org", "To: ": "info@hybridgroupco.com", "ByHost: ": "mail.hybridgroupco.com:587", "Password: ": "PWiE8a9WlECjO", "From: ": "info@hybridgroupco.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.941872630.0000000000475000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.942359260.0000000002180000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.942468067.0000000002252000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 16 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.PI.exe.2180000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              7.2.PI.exe.bb0000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.PI.exe.2180000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  7.2.PI.exe.790000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    2.2.PI.exe.2250000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 8 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Drops script at startup locationShow sources
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\notepad.exe, ProcessId: 1476, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: PI.exe.5152.2.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "l6qpC", "URL: ": "https://xmFob4yUwp.org", "To: ": "info@hybridgroupco.com", "ByHost: ": "mail.hybridgroupco.com:587", "Password: ": "PWiE8a9WlECjO", "From: ": "info@hybridgroupco.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PI.exeReversingLabs: Detection: 52%
                      Machine Learning detection for sampleShow sources
                      Source: PI.exeJoe Sandbox ML: detected
                      Source: 7.2.PI.exe.bb0000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.PI.exe.2250000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.2.PI.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.2.PI.exe.2760000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
                      Source: global trafficTCP traffic: 192.168.2.4:49745 -> 66.70.204.222:587
                      Source: Joe Sandbox ViewIP Address: 66.70.204.222 66.70.204.222
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: global trafficTCP traffic: 192.168.2.4:49745 -> 66.70.204.222:587
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233A186 recv,
                      Source: unknownDNS traffic detected: queries for: mail.hybridgroupco.com
                      Source: PI.exe, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://cert.int-x3.letsencrypt.org/0
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://isrg.trustid.ocsp.identrust.com0;
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.int-x3.letsencrypt.org0/
                      Source: PI.exe, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                      Source: PI.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/
                      Source: PI.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: PI.exe, 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmp, PI.exe, 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmp, PI.exe, 00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmp, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/U
                      Source: PI.exe, 00000002.00000002.943432491.0000000002C69000.00000004.00000001.sdmp, PI.exe, 00000002.00000002.943600197.0000000002D98000.00000004.00000001.sdmpString found in binary or memory: https://xmFob4yUwp.org
                      Source: PI.exe, 00000002.00000002.943293284.0000000002B8A000.00000004.00000001.sdmpString found in binary or memory: https://xmFob4yUwp.org$
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004070C2 OpenClipboard,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00423388 GetClipboardData,CopyEnhMetaFileA,GetEnhMetaFileHeader,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_004239CC GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004586FC GetKeyboardState,SetKeyboardState,SendMessageA,SendMessageA,

                      System Summary:

                      barindex
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004547D0 NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0042E46C NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004493A0 GetSubMenu,SaveDC,RestoreDC,72E7B080,SaveDC,RestoreDC,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00439CA4 NtdllDefWindowProc_A,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0046E159 NtCreateSection,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233B362 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233B331 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_004547D0 NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0042E46C NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_004493A0 GetSubMenu,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00439CA4 NtdllDefWindowProc_A,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_004547D0 NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0042E46C NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_004493A0 GetSubMenu,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00439CA4 NtdllDefWindowProc_A,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0044EEA4
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004493A0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00471BA8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0046BD44
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_00467976
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0046D13D
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_02332478
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E33468
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E20007
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39010
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E331F8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E37990
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E31568
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E31D20
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3810F
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3B6E8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3DBB8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39388
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3CB34
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3C8EB
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39CFE
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E384B1
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E328B8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3C8B8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E348BE
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3C889
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E32099
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3C877
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E36C35
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39000
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3D5C3
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E355D3
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E38998
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E31559
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E32136
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3553A
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39D03
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39D08
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E31D10
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E37A98
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3566C
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E36A72
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E37E78
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E33468
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3A3A2
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E3DBA9
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E357AD
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E39378
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A59C8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A07F0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0D10
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A7710
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A3F22
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A3740
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A5370
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A1EB0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A1CC0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A56F3
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A7E08
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A8648
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0788
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0DBB
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A07D3
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A63CC
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0DCD
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A3FC7
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A7DF8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A1115
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A7703
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A3731
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A3F7C
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0E93
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A7E87
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A72BC
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A1CB0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A1EA3
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A08D6
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0CF2
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A2414
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0A2A
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_059A0E6A
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0044EEA4
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_004493A0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00471BA8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0046BD44
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0044EEA4
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_004493A0
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00471BA8
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0046BD44
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_00467976
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_0046D13D
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 004035DC appears 109 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 00467F3C appears 33 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 00403E24 appears 54 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 00402774 appears 44 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 0040436C appears 54 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 004066E0 appears 48 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 004148B4 appears 36 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 00404348 appears 233 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 0040C2CC appears 54 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 004039A8 appears 118 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 00403DD0 appears 40 times
                      Source: C:\Users\user\Desktop\PI.exeCode function: String function: 0040695C appears 42 times
                      Source: PI.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                      Source: PI.exe, 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameyZFlSsyWYLpOIrYUuUqNGPSmFjhfv.exe4 vs PI.exe
                      Source: PI.exe, 00000000.00000002.681052578.0000000002370000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PI.exe
                      Source: PI.exeBinary or memory string: OriginalFilename vs PI.exe
                      Source: PI.exe, 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameyZFlSsyWYLpOIrYUuUqNGPSmFjhfv.exe4 vs PI.exe
                      Source: PI.exe, 00000002.00000002.944407117.00000000058A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs PI.exe
                      Source: PI.exe, 00000002.00000002.944104826.0000000005210000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PI.exe
                      Source: PI.exe, 00000003.00000002.707407270.0000000002330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PI.exe
                      Source: PI.exe, 00000005.00000002.708291240.0000000002836000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameyZFlSsyWYLpOIrYUuUqNGPSmFjhfv.exe4 vs PI.exe
                      Source: PI.exe, 00000005.00000002.708009088.0000000002470000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PI.exe
                      Source: PI.exeBinary or memory string: OriginalFilename vs PI.exe
                      Source: PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameyZFlSsyWYLpOIrYUuUqNGPSmFjhfv.exe4 vs PI.exe
                      Source: 0.2.PI.exe.2770000.3.unpack, gtu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PI.exe.2770000.3.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                      Source: 0.2.PI.exe.2770000.3.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.PI.exe.2770000.3.unpack, DPAPI.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PI.exe.2770000.3.unpack, DPAPI.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.PI.exe.21e0000.2.unpack, gtu.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.PI.exe.21e0000.2.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                      Source: 2.2.PI.exe.21e0000.2.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/2@1/2
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00420A54 GetLastError,FormatMessageA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233B1E6 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233B1AF AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00408B5E GetDiskFreeSpaceA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004171B0 FindResourceA,LoadResource,SizeofResource,LockResource,
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbsJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs'
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PI.exeReversingLabs: Detection: 52%
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: unknownProcess created: C:\Windows\SysWOW64\notepad.exe C:\Windows\system32\notepad.exe
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe' 2 5152 5197828
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs'
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: unknownProcess created: C:\Windows\SysWOW64\notepad.exe C:\Windows\system32\notepad.exe
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe' 2 6728 5209890
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\notepad.exe C:\Windows\system32\notepad.exe
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe' 2 5152 5197828
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Windows\SysWOW64\notepad.exe C:\Windows\system32\notepad.exe
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe' 2 6728 5209890
                      Source: C:\Users\user\Desktop\PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\PI.exeUnpacked PE file: 2.2.PI.exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\PI.exeUnpacked PE file: 2.2.PI.exe.2250000.3.unpack
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\PI.exeUnpacked PE file: 2.2.PI.exe.400000.0.unpack
                      .NET source code contains potential unpackerShow sources
                      Source: 0.2.PI.exe.2770000.3.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.2.PI.exe.21e0000.2.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.2.PI.exe.2250000.3.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.2.PI.exe.400000.0.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 7.2.PI.exe.bb0000.3.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 7.2.PI.exe.b40000.2.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00440918 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00440F64 push 00440FF1h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040C076 push 0040C0E7h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040C078 push 0040C0E7h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040C156 push 0040C184h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040C158 push 0040C184h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004421E4 push ecx; mov dword ptr [esp], edx
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004101F0 push 004103F1h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0041018C push 004101EDh; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004642CC push 004642F8h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004103F4 push 00410538h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004264A8 push 00426578h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0041050C push 00410538h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0044251C push 00442548h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040659E push 004065F1h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004065A0 push 004065F1h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00460674 push 004606A0h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004306D0 push 0043073Ah; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0041C680 push ecx; mov dword ptr [esp], edx
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00426688 push 004266B4h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00406770 push 0040679Ch; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0043073C push 004307A6h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0040682C push 00406858h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00426940 push 0042696Ch; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0041A914 push ecx; mov dword ptr [esp], edx
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0045691C push 00456976h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_004289CC push 004289F8h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00428980 push 004289C1h; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00428A04 push 00428A3Ch; ret
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00456B34 push ecx; mov dword ptr [esp], edx
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00412BE4 push ecx; mov dword ptr [esp], eax
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0042EBF4 push 0042EC20h; ret

                      Boot Survival:

                      barindex
                      Drops VBS files to the startup folderShow sources
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbsJump to dropped file
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbsJump to behavior
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbsJump to behavior
                      Source: C:\Windows\SysWOW64\notepad.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbsJump to behavior
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00454858 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0043C504 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0043B378 IsIconic,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00427394 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0045194C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0043BC20 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00454858 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0043C504 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0043B378 IsIconic,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00427394 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0045194C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0043BC20 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00454858 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0043C504 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00454F4C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00454FFC IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0043B378 IsIconic,GetCapture,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00427394 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0045194C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0043BC20 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00440918 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PI.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Contains functionality to detect sleep reduction / modificationsShow sources
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_0043061C
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_0043061C
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0043061C
                      Delayed program exit foundShow sources
                      Source: C:\Windows\SysWOW64\notepad.exeCode function: 1_2_032305C0 Sleep,ExitProcess,
                      Source: C:\Windows\SysWOW64\notepad.exeCode function: 6_2_00CB05C0 Sleep,ExitProcess,
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\System32\wscript.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
                      Source: C:\Users\user\Desktop\PI.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_0043061C
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -120000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -118624s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -88641s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -88359s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -117440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -87330s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -115624s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -115188s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -56906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -113440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -113000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -83718s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -111188s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -110812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -109440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -109000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -108624s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -80109s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -79830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -79500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -52720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -52500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -78468s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -78141s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -51720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -76830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -76500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -101188s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -49906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -49720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -99000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -73218s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -72891s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -96812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -96440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -71250s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -70968s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -69609s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -69330s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -46000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -45720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -67968s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -67359s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -44720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -66330s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -66000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -43812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -64359s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -64080s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -41812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -41594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -41406s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -82440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -61080s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -60468s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -60141s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -39594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -58830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -58500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -58218s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -38500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -57141s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -56859s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -56580s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -55830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -55500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -55218s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -54891s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -36094s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -53859s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -35720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -53250s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -35000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -52218s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -51891s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -34406s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -51330s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -33906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -33720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -50250s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -49641s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -32812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -32594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -48609s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -48000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -31500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -46968s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -61440s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -45750s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -45000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -44718s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -42750s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -38859s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -38580s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -37218s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -35580s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -35250s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -89718s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -89391s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -87750s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -86109s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -85830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -84468s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -54094s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -80580s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -75609s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -75330s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -73968s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -73641s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -48000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -64830s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -63141s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -61500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -39906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -39720s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -38594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -36220s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -35094s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -34000s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -32906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -31812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -31594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -55220s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -52594s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -51500s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -47094s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -46906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -45812s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -45094s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -43406s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -42312s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6912Thread sleep time: -30906s >= -30000s
                      Source: C:\Users\user\Desktop\PI.exe TID: 6552Thread sleep count: 74 > 30
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PI.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PI.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PI.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PI.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00475588 GetSystemTime followed by cmp: cmp word ptr [esp], 07e4h and CTI: jnc 004755A3h
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00475588 GetSystemTime followed by cmp: cmp word ptr [esp], 07e4h and CTI: jnc 004755A3h
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00475588 GetSystemTime followed by cmp: cmp word ptr [esp], 07e4h and CTI: jnc 004755A3h
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 3_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00408994 FindFirstFileA,GetLastError,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 5_2_00405AE8 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00420FE4 GetSystemInfo,
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
                      Source: PI.exe, 00000002.00000002.944104826.0000000005210000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: PI.exe, 00000002.00000002.944104826.0000000005210000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: PI.exe, 00000002.00000002.944104826.0000000005210000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: wscript.exe, 00000004.00000002.702851391.0000022471482000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Z
                      Source: wscript.exe, 00000004.00000002.702851391.0000022471482000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PI.exe, 00000002.00000002.944104826.0000000005210000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\PI.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugFlags
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugObjectHandle
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugFlags
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugObjectHandle
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugFlags
                      Source: C:\Users\user\Desktop\PI.exeProcess queried: DebugObjectHandle
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_04E33468 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_004696F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00440918 SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0046D412 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0046D4D0 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_0046D412 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_0046D4D0 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\PI.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_004696F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_00468746 SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0046BD7F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_00469BB5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_0046BD7F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_004696F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 7_2_00469BB5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\PI.exeMemory protected: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\PI.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 3230000 protect: page execute and read and write
                      Source: C:\Users\user\Desktop\PI.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 3240000 protect: page read and write
                      Source: C:\Users\user\Desktop\PI.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: CB0000 protect: page execute and read and write
                      Source: C:\Users\user\Desktop\PI.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: CC0000 protect: page read and write
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: unknown target: C:\Users\user\Desktop\PI.exe protection: execute and read and write
                      Source: C:\Users\user\Desktop\PI.exeSection loaded: unknown target: C:\Users\user\Desktop\PI.exe protection: execute and read and write
                      Queues an APC in another process (thread injection)Show sources
                      Source: C:\Users\user\Desktop\PI.exeThread APC queued: target process: C:\Windows\SysWOW64\notepad.exe
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\PI.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 3230000
                      Source: C:\Users\user\Desktop\PI.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 3240000
                      Source: C:\Users\user\Desktop\PI.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: CB0000
                      Source: C:\Users\user\Desktop\PI.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: CC0000
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: C:\Users\user\Desktop\PI.exeProcess created: C:\Users\user\Desktop\PI.exe 'C:\Users\user\Desktop\PI.exe'
                      Source: PI.exe, 00000002.00000002.942302186.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: PI.exe, 00000002.00000002.942302186.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: PI.exe, 00000002.00000002.942302186.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: PI.exe, 00000002.00000002.942302186.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,GetACP,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,GetACP,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,GetACP,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Users\user\Desktop\PI.exeCode function: GetLocaleInfoA,
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00475588 GetSystemTime,ExitProcess,GetNextDlgTabItem,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 2_2_0233A502 GetUserNameW,
                      Source: C:\Users\user\Desktop\PI.exeCode function: 0_2_00440F64 GetVersion,
                      Source: C:\Users\user\Desktop\PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: PI.exe, 00000000.00000002.680325895.000000000019D000.00000004.00000010.sdmp, PI.exe, 00000003.00000002.705494157.000000000019D000.00000004.00000010.sdmp, PI.exe, 00000005.00000002.707159490.000000000019D000.00000004.00000010.sdmpBinary or memory string: avp.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.941872630.0000000000475000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942359260.0000000002180000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942468067.0000000002252000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943139633.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.705557320.0000000000475000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.681329227.0000000002772000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.706213393.0000000000790000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.707115774.0000000000BB2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000001.705125363.0000000000499000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943293284.0000000002B8A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942414784.00000000021E2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943432491.0000000002C69000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6744, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6728, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6512, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 5152, type: MEMORY
                      Source: Yara matchFile source: 2.2.PI.exe.2180000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.bb0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.2180000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.790000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.2250000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.PI.exe.2760000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.1.PI.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PI.exe.2770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.b40000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.790000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.21e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.400000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\PI.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Desktop\PI.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 5152, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.941872630.0000000000475000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942359260.0000000002180000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942468067.0000000002252000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943139633.0000000002AC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.705557320.0000000000475000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.681329227.0000000002772000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.706213393.0000000000790000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.707115774.0000000000BB2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000001.705125363.0000000000499000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943293284.0000000002B8A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.942414784.00000000021E2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.943432491.0000000002C69000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6744, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6728, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 6512, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PI.exe PID: 5152, type: MEMORY
                      Source: Yara matchFile source: 2.2.PI.exe.2180000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.bb0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.2180000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.790000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.2250000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.PI.exe.2760000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.1.PI.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PI.exe.2770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.b40000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PI.exe.790000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.21e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PI.exe.400000.0.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Startup Items1Startup Items1Disable or Modify Tools1OS Credential Dumping2System Time Discovery11Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScripting111Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information11Input Capture11Account Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsNative API1Registry Run Keys / Startup Folder2Access Token Manipulation1Scripting111Credentials in Registry1File and Directory Discovery3SMB/Windows Admin SharesScreen Capture1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Process Injection412Obfuscated Files or Information2NTDSSystem Information Discovery128Distributed Component Object ModelEmail Collection1Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder2Software Packing41LSA SecretsSecurity Software Discovery271SSHInput Capture11Data Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsVirtualization/Sandbox Evasion15VNCClipboard Data2Exfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion15DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemApplication Window Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection412/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 321388 Sample: PI.exe Startdate: 21/11/2020 Architecture: WINDOWS Score: 100 37 Found malware configuration 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected AgentTesla 2->41 43 3 other signatures 2->43 7 PI.exe 2->7         started        10 wscript.exe 1 2->10         started        process3 signatures4 45 Detected unpacking (changes PE section rights) 7->45 47 Detected unpacking (creates a PE file in dynamic memory) 7->47 49 Detected unpacking (overwrites its own PE header) 7->49 51 7 other signatures 7->51 12 PI.exe 4 7->12         started        16 notepad.exe 1 7->16         started        18 PI.exe 7->18         started        20 PI.exe 10->20         started        process5 dnsIp6 31 hybridgroupco.com 66.70.204.222, 49745, 587 OVHFR Canada 12->31 33 mail.hybridgroupco.com 12->33 35 192.168.2.1 unknown unknown 12->35 53 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->53 55 Tries to steal Mail credentials (via file access) 12->55 57 Tries to harvest and steal ftp login credentials 12->57 59 Tries to harvest and steal browser information (history, passwords, etc) 12->59 61 Drops VBS files to the startup folder 16->61 63 Delayed program exit found 16->63 65 Writes to foreign memory regions 20->65 67 Allocates memory in foreign processes 20->67 69 Maps a DLL or memory area into another process 20->69 22 notepad.exe 1 20->22         started        25 PI.exe 20->25         started        27 PI.exe 20->27         started        signatures7 process8 file9 29 C:\Users\user\AppData\Roaming\...\STRATUP.vbs, ASCII 22->29 dropped

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PI.exe52%ReversingLabsWin32.Trojan.LokiBot
                      PI.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.2.PI.exe.400000.0.unpack100%AviraHEUR/AGEN.1131223Download File
                      2.2.PI.exe.21e0000.2.unpack100%AviraHEUR/AGEN.1138205Download File
                      7.2.PI.exe.bb0000.3.unpack100%AviraTR/Spy.Gen8Download File
                      2.1.PI.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.PI.exe.2770000.3.unpack100%AviraHEUR/AGEN.1138205Download File
                      2.2.PI.exe.2250000.3.unpack100%AviraTR/Spy.Gen8Download File
                      5.2.PI.exe.400000.0.unpack100%AviraHEUR/AGEN.1131223Download File
                      0.2.PI.exe.400000.0.unpack100%AviraHEUR/AGEN.1131223Download File
                      7.2.PI.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      5.2.PI.exe.2760000.3.unpack100%AviraTR/Spy.Gen8Download File
                      7.1.PI.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.2.PI.exe.400000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                      7.2.PI.exe.b40000.2.unpack100%AviraHEUR/AGEN.1138205Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      https://xmFob4yUwp.org0%Avira URL Cloudsafe
                      http://127.0.0.1:0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      https://xmFob4yUwp.org$0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://crl.identrust0%Avira URL Cloudsafe
                      http://ocsp.int-x3.letsencrypt.org0/0%URL Reputationsafe
                      http://ocsp.int-x3.letsencrypt.org0/0%URL Reputationsafe
                      http://ocsp.int-x3.letsencrypt.org0/0%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      hybridgroupco.com
                      66.70.204.222
                      truetrue
                        unknown
                        mail.hybridgroupco.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          https://xmFob4yUwp.orgPI.exe, 00000002.00000002.943432491.0000000002C69000.00000004.00000001.sdmp, PI.exe, 00000002.00000002.943600197.0000000002D98000.00000004.00000001.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://127.0.0.1:PI.exe, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/PI.exefalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/UPI.exe, 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmp, PI.exe, 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmp, PI.exe, 00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmp, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://cps.letsencrypt.org0PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://xmFob4yUwp.org$PI.exe, 00000002.00000002.943293284.0000000002B8A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://api.telegram.org/bot%telegramapi%/PI.exe, PI.exe, 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmpfalse
                            high
                            http://cert.int-x3.letsencrypt.org/0PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPI.exefalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://crl.identrustPI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ocsp.int-x3.letsencrypt.org0/PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://cps.root-x1.letsencrypt.org0PI.exe, 00000002.00000002.944519197.0000000005A20000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              66.70.204.222
                              unknownCanada
                              16276OVHFRtrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:321388
                              Start date:21.11.2020
                              Start time:09:21:28
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 56s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PI.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:21
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@16/2@1/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 90.7% (good quality ratio 87.9%)
                              • Quality average: 84.9%
                              • Quality standard deviation: 25.2%
                              HCA Information:
                              • Successful, ratio: 83%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.43.139.144, 51.104.144.132, 52.155.217.156, 20.54.26.129, 2.20.142.210, 2.20.142.209, 51.104.139.180, 92.122.213.194, 92.122.213.247
                              • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              09:22:33AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs
                              09:22:48API Interceptor800x Sleep call for process: PI.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              66.70.204.222d9f83622ec1564600202a937d2414af8.exeGet hashmaliciousBrowse
                                Image001.exeGet hashmaliciousBrowse
                                  mEPbT6Dbzc.exeGet hashmaliciousBrowse
                                    b32sUgpVdT.exeGet hashmaliciousBrowse
                                      ZXeB2BO1Lq.exeGet hashmaliciousBrowse
                                        kiGANMAmR3.exeGet hashmaliciousBrowse
                                          QM34U1x8I6.exeGet hashmaliciousBrowse
                                            Y2UrKCOaJm.exeGet hashmaliciousBrowse
                                              SJAOO8OCe3.exeGet hashmaliciousBrowse
                                                zh7966Pn0I.exeGet hashmaliciousBrowse
                                                  o7B4zT1WNb.exeGet hashmaliciousBrowse
                                                    emMAbUc8Xg.exeGet hashmaliciousBrowse
                                                      a2onj1GOHs.exeGet hashmaliciousBrowse
                                                        RDp6VoVSfQ.exeGet hashmaliciousBrowse
                                                          DUE_INVOICE.exeGet hashmaliciousBrowse
                                                            2M3ZdRze7b.exeGet hashmaliciousBrowse
                                                              36n0FgVGxo.exeGet hashmaliciousBrowse
                                                                ErKsKTqlS4.exeGet hashmaliciousBrowse
                                                                  yrPgLCinv1.exeGet hashmaliciousBrowse
                                                                    O0iCB546uj.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      OVHFRhttps://faxfax.zizera.com/remittanceadviceGet hashmaliciousBrowse
                                                                      • 167.114.119.127
                                                                      https://coralcliffs.com.do/review/Get hashmaliciousBrowse
                                                                      • 188.165.231.37
                                                                      https://rugbysacele.ro/zz/IK/of1/nhctfwp4x278qkbusvijl6z39y5ema1o0gdr597irqhw4x0fk3uevzlaoj12bdmpsnt8g6yce40h6iv7bprsowxd3z2nmu8kal5gcj1yf9qt?data=dmluY2VudC5kdXNvcmRldEBpbWQub3Jn#aHR0cHM6Ly9ydWdieXNhY2VsZS5yby96ei9JSy9vZjEvNDUzMjY3NzY4JmVtYWlsPXZpbmNlbnQuZHVzb3JkZXRAaW1kLm9yZw==Get hashmaliciousBrowse
                                                                      • 51.195.133.190
                                                                      http://flossdental.com.auGet hashmaliciousBrowse
                                                                      • 46.105.201.240
                                                                      https://bit.ly/2UDM1ToGet hashmaliciousBrowse
                                                                      • 54.38.220.151
                                                                      inquiry-010.14.2020.docGet hashmaliciousBrowse
                                                                      • 94.23.162.163
                                                                      http://WWW.ALYSSA-J-MILANO.COMGet hashmaliciousBrowse
                                                                      • 51.89.9.253
                                                                      http://septterror.tripod.com/the911basics.htmlGet hashmaliciousBrowse
                                                                      • 51.89.9.253
                                                                      https://winnersoft.lu/systemadmin/?12=Get hashmaliciousBrowse
                                                                      • 91.121.74.46
                                                                      https://carolearmstrongrealestate.com/wpe/14ea332d0684051d9fef033a5f1607dd?usr=cnBlbmRsZXRvbkBkYXRlc3dlaXNlci5jb20=Get hashmaliciousBrowse
                                                                      • 51.38.157.153
                                                                      Order specs19.11.20.exeGet hashmaliciousBrowse
                                                                      • 51.195.43.214
                                                                      QUOTE.exeGet hashmaliciousBrowse
                                                                      • 51.89.1.123
                                                                      ORDER INQUIRY.exeGet hashmaliciousBrowse
                                                                      • 51.91.236.193
                                                                      KYC_DOC_.EXEGet hashmaliciousBrowse
                                                                      • 51.79.191.17
                                                                      MV GRAN LOBO 008.xlsxGet hashmaliciousBrowse
                                                                      • 188.165.53.185
                                                                      MV GRAN LOBO 008.xlsxGet hashmaliciousBrowse
                                                                      • 188.165.53.185
                                                                      d9f83622ec1564600202a937d2414af8.exeGet hashmaliciousBrowse
                                                                      • 66.70.204.222
                                                                      direct_010.20.docGet hashmaliciousBrowse
                                                                      • 94.23.162.163
                                                                      #Ud83c#Udfb6 18 November, 2020 Pam.Guetschow@citrix.com.wavv.htmGet hashmaliciousBrowse
                                                                      • 51.210.112.130
                                                                      https://duemiglia.comGet hashmaliciousBrowse
                                                                      • 164.132.38.167

                                                                      JA3 Fingerprints

                                                                      No context

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs
                                                                      Process:C:\Windows\SysWOW64\notepad.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):115
                                                                      Entropy (8bit):5.21081668642801
                                                                      Encrypted:false
                                                                      SSDEEP:3:DcdkiTGqLRVFGkxLbpCSUKRijsHot+WfW1s0IRkn:DGiqLTF7xPsSUK4YIwvm0zn
                                                                      MD5:E54054FC279ABBD8A620359997CC038C
                                                                      SHA1:D294DB0EB635954E1B56A289353447A302C743E9
                                                                      SHA-256:8F70AA584CF7DAB7F6E49EC1F919383E10AEBF1003D13942D7FC464B8454C43B
                                                                      SHA-512:C4478A5A604A7777A4648605BA245197268FE39288510EF35AB5043D3B6801B2B991DBCCB78C7CF86E952E6EC4ABAFC51D4AFAE352DAD7FD57F0C5D65715D40D
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview: sET DoMPeytCoqmYV = creAtEOBject("WscRIpT.sHELl")..dOmPeytCoqmyv.rUn """C:\Users\user\Desktop\PI.exe""", 0, False.

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):6.891460444973993
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.24%
                                                                      • InstallShield setup (43055/19) 0.43%
                                                                      • Win32 Executable Delphi generic (14689/80) 0.15%
                                                                      • Windows Screen Saver (13104/52) 0.13%
                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                      File name:PI.exe
                                                                      File size:987648
                                                                      MD5:dbda32339a6965fefc794f220f944016
                                                                      SHA1:3e53b09125eb1e031f5f0e777836ba738b84fc42
                                                                      SHA256:c62b96f303f538748543747d1dacb97119dd9826b53ef6c8350b5b24d69f0006
                                                                      SHA512:be3282f1211845289f41775cd423312efca1a5cccfa5bfbf5a4baa31bb55b6067b0d40db3f82113c0166998c4bfd9459699bd0673acc68e3c5320244513a05fb
                                                                      SSDEEP:12288:hKXgLuyHgzDsn+cNObHRsVxFJkIHXAtijJZeTTaXF/c76r8bNKzkV2Xh:QGfgzIn+CA2VPJVRjJWTORc7U8xKIV2R
                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                                                                      File Icon

                                                                      Icon Hash:f0f06094c36ee8c2

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x475a24
                                                                      Entrypoint Section:CODE
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                                                                      DLL Characteristics:
                                                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:9ff85556c80c0bd14a575736c76ce536

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      add esp, FFFFFFF0h
                                                                      mov eax, 00475834h
                                                                      call 00007FCC44AA4E3Dh
                                                                      mov eax, dword ptr [0049111Ch]
                                                                      mov eax, dword ptr [eax]
                                                                      call 00007FCC44AF3BD5h
                                                                      mov ecx, dword ptr [00491214h]
                                                                      mov eax, dword ptr [0049111Ch]
                                                                      mov eax, dword ptr [eax]
                                                                      mov edx, dword ptr [00475350h]
                                                                      call 00007FCC44AF3BD5h
                                                                      mov eax, dword ptr [0049111Ch]
                                                                      mov eax, dword ptr [eax]
                                                                      call 00007FCC44AF3C49h
                                                                      call 00007FCC44AA2934h
                                                                      lea eax, dword ptr [eax+00h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x930000x2476.idata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa00000x56b38.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000x78e0.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x970000x18.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      CODE0x10000x74a6c0x74c00False0.527640691916data6.51771227621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      DATA0x760000x1b2a80x1b400False0.175790209289data2.73498209356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      BSS0x920000xcb10x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .idata0x930000x24760x2600False0.350226151316data4.84432017187IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .tls0x960000x100x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x970000x180x200False0.048828125data0.20058190744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                      .reloc0x980000x78e00x7a00False0.565445696721data6.61076904488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xa00000x56b380x56c00False0.799990431376data7.40298144524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_BITMAP0xa06780x1d0data
                                                                      RT_BITMAP0xa08480x1e4data
                                                                      RT_BITMAP0xa0a2c0x1d0data
                                                                      RT_BITMAP0xa0bfc0x1d0data
                                                                      RT_BITMAP0xa0dcc0x1d0data
                                                                      RT_BITMAP0xa0f9c0x1d0data
                                                                      RT_BITMAP0xa116c0x1d0data
                                                                      RT_BITMAP0xa133c0x1d0data
                                                                      RT_BITMAP0xa150c0x46fb8dataEnglishUnited States
                                                                      RT_BITMAP0xe84c40x1d0data
                                                                      RT_BITMAP0xe86940xd8data
                                                                      RT_BITMAP0xe876c0xd8data
                                                                      RT_BITMAP0xe88440xd8data
                                                                      RT_BITMAP0xe891c0xd8data
                                                                      RT_BITMAP0xe89f40xd8data
                                                                      RT_BITMAP0xe8acc0xe8GLS_BINARY_LSB_FIRST
                                                                      RT_ICON0xe8bb40xd228data
                                                                      RT_ICON0xf5ddc0x1e8dataEnglishUnited States
                                                                      RT_DIALOG0xf5fc40x52data
                                                                      RT_RCDATA0xf60180x10data
                                                                      RT_RCDATA0xf60280x274data
                                                                      RT_RCDATA0xf629c0x6caDelphi compiled form 'TForm1'
                                                                      RT_GROUP_ICON0xf69680x14dataEnglishUnited States
                                                                      RT_GROUP_ICON0xf697c0x14data
                                                                      RT_HTML0xf69900x1a5dataEnglishUnited States

                                                                      Imports

                                                                      DLLImport
                                                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                                                      user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                      oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                      kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                      kernel32.dlllstrcpyA, lstrcmpA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtectEx, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemTime, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                      version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                      gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExtCreatePen, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                                                                      user32.dllWindowFromPoint, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetNextDlgTabItem, GetMessageTime, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreateWindowExA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                      kernel32.dllSleep
                                                                      oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeTypeEx, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                                      comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                                                      kernel32.dllMulDiv

                                                                      Possible Origin

                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States

                                                                      Network Behavior

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 21, 2020 09:23:09.924571037 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.028354883 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.028501987 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.266788960 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.267379999 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.371258020 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.375641108 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.480600119 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.529444933 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.605269909 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.714890003 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.714910984 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.714929104 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.715009928 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.722001076 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.825871944 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:10.873198986 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:10.900733948 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.004554987 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.005378962 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.109406948 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.110090017 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.214315891 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.214966059 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.318675041 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.319313049 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.423187971 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.424026966 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.527724028 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.529405117 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.529438972 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.529639006 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.529697895 CET49745587192.168.2.466.70.204.222
                                                                      Nov 21, 2020 09:23:11.633145094 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.633163929 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.633178949 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.633196115 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.635540009 CET5874974566.70.204.222192.168.2.4
                                                                      Nov 21, 2020 09:23:11.685883999 CET49745587192.168.2.466.70.204.222

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 21, 2020 09:22:29.665887117 CET5585453192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:29.701451063 CET53558548.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:30.782808065 CET6454953192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:30.820704937 CET53645498.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:31.618479013 CET6315353192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:31.658363104 CET53631538.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:33.606868029 CET5299153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:33.633958101 CET53529918.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:34.454566956 CET5370053192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:34.481839895 CET53537008.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:36.034655094 CET5172653192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:36.061861992 CET53517268.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:36.859998941 CET5679453192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:36.887221098 CET53567948.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:37.800707102 CET5653453192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:37.827805042 CET53565348.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:38.591844082 CET5662753192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:38.618913889 CET53566278.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:39.402890921 CET5662153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:39.430139065 CET53566218.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:40.270179033 CET6311653192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:40.297343969 CET53631168.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:41.075125933 CET6407853192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:41.102283001 CET53640788.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:22:53.258553982 CET6480153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:22:53.285664082 CET53648018.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:09.849884033 CET6172153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:09.900660992 CET53617218.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:12.888914108 CET5125553192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:12.924585104 CET53512558.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:13.544195890 CET6152253192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:13.591140032 CET53615228.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:14.005001068 CET5233753192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:14.042680979 CET53523378.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:14.345452070 CET5504653192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:14.381134987 CET53550468.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:14.571958065 CET4961253192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:14.607553005 CET53496128.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:14.738149881 CET4928553192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:14.773812056 CET53492858.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:15.049410105 CET5060153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:15.087235928 CET53506018.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:15.203252077 CET6087553192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:15.230339050 CET53608758.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:15.750739098 CET5644853192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:15.786406040 CET53564488.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:16.347703934 CET5917253192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:16.374716997 CET53591728.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:17.341249943 CET6242053192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:17.368442059 CET53624208.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:17.770350933 CET6057953192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:17.806009054 CET53605798.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:27.831593037 CET5018353192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:27.858556032 CET53501838.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:28.011451960 CET6153153192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:28.047419071 CET53615318.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:23:32.962865114 CET4922853192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:23:32.998584986 CET53492288.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:24:03.075450897 CET5979453192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:24:03.102566004 CET53597948.8.8.8192.168.2.4
                                                                      Nov 21, 2020 09:24:04.330602884 CET5591653192.168.2.48.8.8.8
                                                                      Nov 21, 2020 09:24:04.366344929 CET53559168.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Nov 21, 2020 09:23:09.849884033 CET192.168.2.48.8.8.80x605eStandard query (0)mail.hybridgroupco.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Nov 21, 2020 09:23:09.900660992 CET8.8.8.8192.168.2.40x605eNo error (0)mail.hybridgroupco.comhybridgroupco.comCNAME (Canonical name)IN (0x0001)
                                                                      Nov 21, 2020 09:23:09.900660992 CET8.8.8.8192.168.2.40x605eNo error (0)hybridgroupco.com66.70.204.222A (IP address)IN (0x0001)

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Nov 21, 2020 09:23:10.266788960 CET5874974566.70.204.222192.168.2.4220-host.theserver.live ESMTP Exim 4.93 #2 Sat, 21 Nov 2020 12:23:10 +0400
                                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                                      220 and/or bulk e-mail.
                                                                      Nov 21, 2020 09:23:10.267379999 CET49745587192.168.2.466.70.204.222EHLO 284992
                                                                      Nov 21, 2020 09:23:10.371258020 CET5874974566.70.204.222192.168.2.4250-host.theserver.live Hello 284992 [84.17.52.25]
                                                                      250-SIZE 52428800
                                                                      250-8BITMIME
                                                                      250-PIPELINING
                                                                      250-STARTTLS
                                                                      250 HELP
                                                                      Nov 21, 2020 09:23:10.375641108 CET49745587192.168.2.466.70.204.222STARTTLS
                                                                      Nov 21, 2020 09:23:10.480600119 CET5874974566.70.204.222192.168.2.4220 TLS go ahead

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:09:22:30
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe'
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Borland Delphi
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.681442399.00000000027E5000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.681329227.0000000002772000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:22:31
                                                                      Start date:21/11/2020
                                                                      Path:C:\Windows\SysWOW64\notepad.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\system32\notepad.exe
                                                                      Imagebase:0xcf0000
                                                                      File size:236032 bytes
                                                                      MD5 hash:D693F13FE3AA2010B854C4C60671B8E2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:22:31
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe'
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.941812642.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.941872630.0000000000475000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.942359260.0000000002180000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.942468067.0000000002252000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.943139633.0000000002AC1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.943293284.0000000002B8A000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.942414784.00000000021E2000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.943432491.0000000002C69000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:22:32
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe' 2 5152 5197828
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Borland Delphi
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:22:41
                                                                      Start date:21/11/2020
                                                                      Path:C:\Windows\System32\wscript.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\STRATUP.vbs'
                                                                      Imagebase:0x7ff6a8ea0000
                                                                      File size:163840 bytes
                                                                      MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:22:43
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe'
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Borland Delphi
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.708227438.00000000027D5000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:22:43
                                                                      Start date:21/11/2020
                                                                      Path:C:\Windows\SysWOW64\notepad.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\system32\notepad.exe
                                                                      Imagebase:0xcf0000
                                                                      File size:236032 bytes
                                                                      MD5 hash:D693F13FE3AA2010B854C4C60671B8E2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:09:22:44
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe'
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.706572619.0000000000B42000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.705557320.0000000000475000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.706213393.0000000000790000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.707115774.0000000000BB2000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000001.705125363.0000000000499000.00000040.00020000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:09:22:44
                                                                      Start date:21/11/2020
                                                                      Path:C:\Users\user\Desktop\PI.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:'C:\Users\user\Desktop\PI.exe' 2 6728 5209890
                                                                      Imagebase:0x400000
                                                                      File size:987648 bytes
                                                                      MD5 hash:DBDA32339A6965FEFC794F220F944016
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >