Loading ...

Play interactive tourEdit tour

Analysis Report New PO #0164522433 JAN 2021.gz.exe

Overview

General Information

Sample Name:New PO #0164522433 JAN 2021.gz.exe
Analysis ID:339125
MD5:366c006291f6adb53ecdaa39bc1f3c24
SHA1:5bab58638bffd0b5933f2e266b6f689d9835a9e7
SHA256:43891ebd12a33234d3776da3e200f2d778cc1a169050f3db729ceb8838f0ebd1
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.578500355.0000000003443000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Multi AV Scanner detection for submitted fileShow sources
              Source: New PO #0164522433 JAN 2021.gz.exeVirustotal: Detection: 23%Perma Link
              Machine Learning detection for sampleShow sources
              Source: New PO #0164522433 JAN 2021.gz.exeJoe Sandbox ML: detected
              Source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: http://mWLzHd.com
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmp, New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.223823052.000000000132B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary:

              barindex
              .NET source code contains very large array initializationsShow sources
              Source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b79DC2F01u002dFAFFu002d4FF0u002dBA64u002dE3D4296BD410u007d/AACAB8EDu002d2C83u002d4858u002d8795u002dEEDB395CF94A.csLarge array initialization: .cctor: array initializer size 11780
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 1_2_00BA90131_2_00BA9013
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 1_2_030EC62C1_2_030EC62C
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 1_2_030EE8901_2_030EE890
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 1_2_030EE8A01_2_030EE8A0
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_00F090132_2_00F09013
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_0149094E2_2_0149094E
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_01490F802_2_01490F80
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_0149A6022_2_0149A602
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_0149A2D02_2_0149A2D0
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C41002_2_014C4100
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C62D02_2_014C62D0
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C06682_2_014C0668
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C19B82_2_014C19B8
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C8A482_2_014C8A48
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_015060682_2_01506068
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_015015002_2_01501500
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.223605162.0000000000C6C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEventSourceException.exe@ vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDEBppvHXdgcoxrhnKZalEBYtvqYaM.exe4 vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.223823052.000000000132B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000000.222934806.0000000000FCC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEventSourceException.exe@ vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.573629913.0000000001358000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.572733398.0000000000438000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameDEBppvHXdgcoxrhnKZalEBYtvqYaM.exe4 vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exeBinary or memory string: OriginalFilenameEventSourceException.exe@ vs New PO #0164522433 JAN 2021.gz.exe
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@3/1@0/0
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO #0164522433 JAN 2021.gz.exe.logJump to behavior
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: New PO #0164522433 JAN 2021.gz.exeVirustotal: Detection: 23%
              Source: unknownProcess created: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe 'C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe'
              Source: unknownProcess created: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess created: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: New PO #0164522433 JAN 2021.gz.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: New PO #0164522433 JAN 2021.gz.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.2.New PO #0164522433 JAN 2021.gz.exe.ba0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.0.New PO #0164522433 JAN 2021.gz.exe.ba0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 2.0.New PO #0164522433 JAN 2021.gz.exe.f00000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 2.2.New PO #0164522433 JAN 2021.gz.exe.f00000.1.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014908B8 pushad ; iretd 2_2_014908B9
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014908BA push esp; iretd 2_2_014908C1
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_01491B68 push ecx; retf 2_2_01491B6C
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014967A7 push edi; retn 0000h2_2_014967A9
              Source: initial sampleStatic PE information: section name: .text entropy: 7.28301049157
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 6120, type: MEMORY
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWindow / User API: threadDelayed 1784Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWindow / User API: threadDelayed 8073Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe TID: 2396Thread sleep time: -52827s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe TID: 2168Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe TID: 4464Thread sleep time: -15679732462653109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe TID: 4456Thread sleep count: 1784 > 30Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe TID: 4456Thread sleep count: 8073 > 30Jump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeCode function: 2_2_014C4100 LdrInitializeThunk,2_2_014C4100
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeProcess created: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeJump to behavior
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.577700823.0000000001DF0000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.577700823.0000000001DF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.577700823.0000000001DF0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.577700823.0000000001DF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000002.00000002.578500355.0000000003443000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 1288, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 6120, type: MEMORY
              Source: Yara matchFile source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 1288, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000002.00000002.578500355.0000000003443000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 1288, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: New PO #0164522433 JAN 2021.gz.exe PID: 6120, type: MEMORY
              Source: Yara matchFile source: 2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12Masquerading1OS Credential Dumping1Security Software Discovery211Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion13Input Capture1Virtualization/Sandbox Evasion13Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesArchive Collected Data11Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelData from Local System1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery114SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing12DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              New PO #0164522433 JAN 2021.gz.exe23%VirustotalBrowse
              New PO #0164522433 JAN 2021.gz.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              2.2.New PO #0164522433 JAN 2021.gz.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://api.ipify.org%0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              http://mWLzHd.com0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://api.ipify.org%GETMozilla/5.0New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              low
              http://DynDns.comDynDNSNew PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haNew PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://api.ipify.org%New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipNew PO #0164522433 JAN 2021.gz.exe, 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmp, New PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://mWLzHd.comNew PO #0164522433 JAN 2021.gz.exe, 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:31.0.0 Red Diamond
              Analysis ID:339125
              Start date:13.01.2021
              Start time:15:18:50
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 38s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:New PO #0164522433 JAN 2021.gz.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:32
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal96.troj.spyw.evad.winEXE@3/1@0/0
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 43
              • Number of non-executed functions: 4
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              15:19:46API Interceptor1023x Sleep call for process: New PO #0164522433 JAN 2021.gz.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO #0164522433 JAN 2021.gz.exe.log
              Process:C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
              MD5:69206D3AF7D6EFD08F4B4726998856D3
              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.276989323124932
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:New PO #0164522433 JAN 2021.gz.exe
              File size:824832
              MD5:366c006291f6adb53ecdaa39bc1f3c24
              SHA1:5bab58638bffd0b5933f2e266b6f689d9835a9e7
              SHA256:43891ebd12a33234d3776da3e200f2d778cc1a169050f3db729ceb8838f0ebd1
              SHA512:a5b9452407508b2a3b06877acbdce3205b97963755432bf21c661aab47a077812a81fdf2594505201a8cb2026c84c1e465a74edd72e84f78ad57426492748128
              SSDEEP:12288:2F+7TXpC4b1tDDpi1yYPt+1Rz8h+2rhn3tYPDZPyf8ek+bQh:XHbRcy8Gq3WPtaUeh0
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P.............f.... ........@.. ....................................@................................

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x4caa66
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x5FFEDDDA [Wed Jan 13 11:47:38 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xcaa140x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x5f4.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xc8a6c0xc8c00False0.690464955635data7.28301049157IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0xcc0000x5f40x600False0.427734375data4.18561725573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xce0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0xcc0900x364data
              RT_MANIFEST0xcc4040x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightCopyright 2011
              Assembly Version1.0.0.0
              InternalNameEventSourceException.exe
              FileVersion1.0.0.0
              CompanyName
              LegalTrademarks
              Comments
              ProductNameFileReplacement
              ProductVersion1.0.0.0
              FileDescriptionFileReplacement
              OriginalFilenameEventSourceException.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:15:19:41
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe'
              Imagebase:0xba0000
              File size:824832 bytes
              MD5 hash:366C006291F6ADB53ECDAA39BC1F3C24
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.224369060.0000000003171000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.226167520.0000000004179000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:15:19:47
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\New PO #0164522433 JAN 2021.gz.exe
              Imagebase:0xf00000
              File size:824832 bytes
              MD5 hash:366C006291F6ADB53ECDAA39BC1F3C24
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.578500355.0000000003443000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.572261277.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.578256610.00000000033F1000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >

                Executed Functions

                APIs
                • GetCurrentProcess.KERNEL32 ref: 030EBB48
                • GetCurrentThread.KERNEL32 ref: 030EBB85
                • GetCurrentProcess.KERNEL32 ref: 030EBBC2
                • GetCurrentThreadId.KERNEL32 ref: 030EBC1B
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: 7e96af43b6d033963aae435fb4594bc7aa7b2c87b8c1650544fa707da5d7b1a7
                • Instruction ID: f2211b90e66634b0d80c899f488c37b319e46b7805702edb82e6de5b23c23d55
                • Opcode Fuzzy Hash: 7e96af43b6d033963aae435fb4594bc7aa7b2c87b8c1650544fa707da5d7b1a7
                • Instruction Fuzzy Hash: 595165B09056498FDB14DFAAD588B9EBBF0EF49314F248459E009A72A0D7B4A884CF61
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetCurrentProcess.KERNEL32 ref: 030EBB48
                • GetCurrentThread.KERNEL32 ref: 030EBB85
                • GetCurrentProcess.KERNEL32 ref: 030EBBC2
                • GetCurrentThreadId.KERNEL32 ref: 030EBC1B
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: a8392831d81c635a294908a9e3944dadf03e15e1d970915e9ff0d4f218569b6a
                • Instruction ID: bf4f4bab6c9e151571f56fc4c96f5a49682983af18b0fc964356aa747fcbe769
                • Opcode Fuzzy Hash: a8392831d81c635a294908a9e3944dadf03e15e1d970915e9ff0d4f218569b6a
                • Instruction Fuzzy Hash: 135154B09057498FDB14DFAAD548B9EBBF4FF88314F248459E009A7390D7B49884CF65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 030E9A36
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 9bc37c2a60e5924ebbba7d839f93d41bea2664a253838ab69eacfca430755ae1
                • Instruction ID: 451e11db833742588a3de1055b73b747fcb20eccdf7bc473d4ac67d7433da407
                • Opcode Fuzzy Hash: 9bc37c2a60e5924ebbba7d839f93d41bea2664a253838ab69eacfca430755ae1
                • Instruction Fuzzy Hash: 13714770A01B058FDB64DF6AD14079ABBF1FF88204F04892ED48ADBA50DB78E845CF91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030EBD97
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: ee33126130e0736ffecf566d618652c6e86374c395b2f535c3ce51023ca5b278
                • Instruction ID: a20280c13a12275b5bea7dd0c5765c8cc49ef9b29e587bf1d192f837537e0a39
                • Opcode Fuzzy Hash: ee33126130e0736ffecf566d618652c6e86374c395b2f535c3ce51023ca5b278
                • Instruction Fuzzy Hash: 202100B5D042489FDB10CFA9D884AEEBFF5EB48320F14841AE958A7310D378A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030EBD97
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 1b0cbabb66ba81938a889d2b4bf51944f026576df79e7f17a500249e31dd0024
                • Instruction ID: ee0186d21574f1d391458b9722b8e3a1a1eb628b057167844dbccc82bf98fad3
                • Opcode Fuzzy Hash: 1b0cbabb66ba81938a889d2b4bf51944f026576df79e7f17a500249e31dd0024
                • Instruction Fuzzy Hash: 4121F5B59042089FDB10CFAAD884ADEFFF8FB48320F14841AE914A7310D374A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030E9AB1,00000800,00000000,00000000), ref: 030E9CC2
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 5d65c6115d01fb9c29e76bfd8fbf463cfe270870766d9c47ffdeb77bbd7af487
                • Instruction ID: f5d2d3ce96204c9ef20c537a162582089b30867f6e8ab0352284cd8d62e353d1
                • Opcode Fuzzy Hash: 5d65c6115d01fb9c29e76bfd8fbf463cfe270870766d9c47ffdeb77bbd7af487
                • Instruction Fuzzy Hash: 8A2106B19002589FCB10DFAAD484ADEFBF4AB89320F15846AE455AB200C379A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030E9AB1,00000800,00000000,00000000), ref: 030E9CC2
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: ba69f9a5cf5149b5d0acfaf818ce4146aa4081cf2149f5eb6729263310d7dd47
                • Instruction ID: cfb85928cc82e55334c9a859252f5631c1448d34354c0ddaab2e66bbe7c21c16
                • Opcode Fuzzy Hash: ba69f9a5cf5149b5d0acfaf818ce4146aa4081cf2149f5eb6729263310d7dd47
                • Instruction Fuzzy Hash: 961114B29042488FCB10DFAAD444BDEFBF4EB89320F14842AE519A7300C379A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 030E9A36
                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 8f3e63fa7155da50176c1393d966b3996d9a5d732fc274de8e6156716c265ed5
                • Instruction ID: a1ea34a5761521a80277ebe43fec1459723ec9fa99a980be2cfe9dd46560e610
                • Opcode Fuzzy Hash: 8f3e63fa7155da50176c1393d966b3996d9a5d732fc274de8e6156716c265ed5
                • Instruction Fuzzy Hash: 3211E0B5D016498FCB10DF9AD444BDEFBF8EF88224F14845AD429B7600D379A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.223926385.000000000152D000.00000040.00000001.sdmp, Offset: 0152D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a1cf7175f3fb0a78b2078a5bafe7476a1b0bc81f6c47cc17bbfb70bfcb28df27
                • Instruction ID: e6f68c39311d1c04d5bdbe116511ab2b1bd0911415cba4b317c08ccb1777fd91
                • Opcode Fuzzy Hash: a1cf7175f3fb0a78b2078a5bafe7476a1b0bc81f6c47cc17bbfb70bfcb28df27
                • Instruction Fuzzy Hash: F521F4B2604240DFDB15DF98D8C0B2ABBB5FB84328F248569E9094F296C376D856C7A1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.223936783.000000000153D000.00000040.00000001.sdmp, Offset: 0153D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 19a8f9d883d51c5b5a73e2bcc53b6c2e3d7c0a244c72574211aa237b196ed607
                • Instruction ID: 5b8ef23aab6fd0f421c920d63b3e79544cce50933388611e52c721153d922213
                • Opcode Fuzzy Hash: 19a8f9d883d51c5b5a73e2bcc53b6c2e3d7c0a244c72574211aa237b196ed607
                • Instruction Fuzzy Hash: 8D2100B1504200DFCB11DFA8D8C0B2AFBB5FB84754F60C9A9E9094F246D33AD807CA61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.223936783.000000000153D000.00000040.00000001.sdmp, Offset: 0153D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bc3a6c501ffa41ff982b2b326c75cda75cb1916b89308c621ccd96d24e971979
                • Instruction ID: 15ad275f23096c5462ce6d8d6f122e380459c71459cddd40e4ca43a41953c045
                • Opcode Fuzzy Hash: bc3a6c501ffa41ff982b2b326c75cda75cb1916b89308c621ccd96d24e971979
                • Instruction Fuzzy Hash: 7F218E755093808FCB02CF64D990B15FF71FB86214F28C5EAD8498F667C33A980ACB62
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.223926385.000000000152D000.00000040.00000001.sdmp, Offset: 0152D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: db75533cb9b6fa6099b867bfc3a53cb548d3d4cf5ca75b8a66c096981064a356
                • Instruction ID: f70a2e33844a2d82e7019ccef27a4dedc312d4fa7af5bf93fdd9b058a7ef3000
                • Opcode Fuzzy Hash: db75533cb9b6fa6099b867bfc3a53cb548d3d4cf5ca75b8a66c096981064a356
                • Instruction Fuzzy Hash: 2B11AF76904280CFDB12CF58D5C4B1ABF71FB85324F24C6A9D9050B656C376D45ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Memory Dump Source
                • Source File: 00000001.00000002.223494883.0000000000BA2000.00000002.00020000.sdmp, Offset: 00BA0000, based on PE: true
                • Associated: 00000001.00000002.223485728.0000000000BA0000.00000002.00020000.sdmp Download File
                • Associated: 00000001.00000002.223605162.0000000000C6C000.00000002.00020000.sdmp Download File
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 30710db9ee2ebc1781887daa631fd844d58b2cf49537c4a9bd9ddab210319b1a
                • Instruction ID: 9235cf7739c26f0f41b51ab245744f1a867152996ed380aba2804ad957c03bb7
                • Opcode Fuzzy Hash: 30710db9ee2ebc1781887daa631fd844d58b2cf49537c4a9bd9ddab210319b1a
                • Instruction Fuzzy Hash: 46A2356680E7C25FCB134B786DB52D17FB1AE27214B1E08C7C4C1CF4A3D118699ADBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d1138eceacd9c01a474ab4288bc57c609477841b0e230317db79684f6ff500e3
                • Instruction ID: 3d17a58946dd7c517751382150d0c3114df9609010ac03c35d0def607ba5f4e5
                • Opcode Fuzzy Hash: d1138eceacd9c01a474ab4288bc57c609477841b0e230317db79684f6ff500e3
                • Instruction Fuzzy Hash: CF12C3F94237468BD314EF67ED981897BA1F756328F904308D2612BAD9D7BC214ACF84
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0558e7db6522bacfb693f87029ae4a1b3515dd1c16add21001580f7c046a071a
                • Instruction ID: e9fb41889075251c5249a7d8470619a1eda29c376225ea7bd9b823af1fad86be
                • Opcode Fuzzy Hash: 0558e7db6522bacfb693f87029ae4a1b3515dd1c16add21001580f7c046a071a
                • Instruction Fuzzy Hash: 75A16C36F1121ACFCF15DFB5C8445EEBBB2FF88300B19856AE815AB220DB71A955CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.224190449.00000000030E0000.00000040.00000001.sdmp, Offset: 030E0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b55a44849468ff3c570513b6aa5abd6d7f5e3e93fda2c208f80dea10de15b080
                • Instruction ID: ccb2ae7b4468c20d20a533ed09527a8010eb6106b6420d5be1d6fb24eaf9f390
                • Opcode Fuzzy Hash: b55a44849468ff3c570513b6aa5abd6d7f5e3e93fda2c208f80dea10de15b080
                • Instruction Fuzzy Hash: 26C118B98227468BD714EF67EC881897B71FB86328F504308D1616BAD8D7BC304ACF94
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4413b432a543f1e6f263e1b4260a29cdfab78cadfdb1d786fcce86a48d565b8a
                • Instruction ID: 65256f79934485b77edadbfcc943c713f9e2f3a7c81f590f86302cab388f3ca1
                • Opcode Fuzzy Hash: 4413b432a543f1e6f263e1b4260a29cdfab78cadfdb1d786fcce86a48d565b8a
                • Instruction Fuzzy Hash: 2C632031D146598FCB11DF68C8846ADF7B1FF99300F55C69AE548AB221EB70AAC4CF81
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fd73240beadf3b338255cf62ae9662e8002455a7f3f6eedd17193af3cc204933
                • Instruction ID: b15a73398bb26cfcae6a119aed62d361cf2ab537beddd479c58408ba3934882d
                • Opcode Fuzzy Hash: fd73240beadf3b338255cf62ae9662e8002455a7f3f6eedd17193af3cc204933
                • Instruction Fuzzy Hash: 1963EE30D1475A8ECB11EF68C884A99F7B1FF99300F55C79AE55867221EB70AAC4CF81
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.575180316.00000000014C0000.00000040.00000001.sdmp, Offset: 014C0000, based on PE: false
                Similarity
                • API ID: InitializeThunk
                • String ID:
                • API String ID: 2994545307-0
                • Opcode ID: a836a8fc3a3c4f1dc795a3ee803840688c4402662f196ce16636a7ce0fc0fcff
                • Instruction ID: 4d130aa8ee22a20bfd6f86275b45469cafc438533032869c8c6e041a294ebd1f
                • Opcode Fuzzy Hash: a836a8fc3a3c4f1dc795a3ee803840688c4402662f196ce16636a7ce0fc0fcff
                • Instruction Fuzzy Hash: E5723B34E006198FCB64EF78C9546DEB7F2AF89304F1585AAD54AAB360EF309D85CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: DispatchMessage
                • String ID:
                • API String ID: 2061451462-0
                • Opcode ID: 99c05a7eb4edab062baa104678607dd3de2f5d47263fa2bc7449c7818755b816
                • Instruction ID: 213a31c9e28406449f41e7803ed677f31876e4787ed7c7daa9e36094691f3453
                • Opcode Fuzzy Hash: 99c05a7eb4edab062baa104678607dd3de2f5d47263fa2bc7449c7818755b816
                • Instruction Fuzzy Hash: 32F15C30A0020ACFDB15DFE9C884B9DBBF1BF88314F558569E509AF2A5DB71E855CB80
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9500f49933770d8c7cae82902c71bea299dbbacfe7de5f62eec0fb1ee7fcd678
                • Instruction ID: 60421128c60c083ee3d504a3e183de71bc464dc236c2e4eaabd4283ecc988ab6
                • Opcode Fuzzy Hash: 9500f49933770d8c7cae82902c71bea299dbbacfe7de5f62eec0fb1ee7fcd678
                • Instruction Fuzzy Hash: 14126D70A001198FDB14DF68C854BAEBBF6BF88314F15856AE506DB3A5DF349C42CB91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 189e720f1e994ce87922ac9cf220a26697cb62569eb8c57d245f6d3068d3de29
                • Instruction ID: 9e5e784931bed9d855637225da1e07f44b1582d8e1e45df8d06e0f80595a5668
                • Opcode Fuzzy Hash: 189e720f1e994ce87922ac9cf220a26697cb62569eb8c57d245f6d3068d3de29
                • Instruction Fuzzy Hash: 77023971A0010ADFDF15CFA9C984AAEBFB6FF88724F15806AE505AB361D731E841CB50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,015024F9,00000800), ref: 0150258A
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: b281bc7e07b403bddab386310709aa88da045ba8cc4c9bd18ff8bb19946e74ba
                • Instruction ID: 8c7f32827875aaff4f3a8257e707e04652dd7f3f5d3395a28d558cc3d11b8001
                • Opcode Fuzzy Hash: b281bc7e07b403bddab386310709aa88da045ba8cc4c9bd18ff8bb19946e74ba
                • Instruction Fuzzy Hash: 76211AB2D002099FDB11DF99D448ADEFBF4FB88310F10852AE519AB240C375A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,015024F9,00000800), ref: 0150258A
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 40ec09e12b17cb0d4e92554ebda873698db33066729f75a909da427160fc7195
                • Instruction ID: 568b758d085de172a4fa86202a0756a30564adc380336e5604591b182f3af445
                • Opcode Fuzzy Hash: 40ec09e12b17cb0d4e92554ebda873698db33066729f75a909da427160fc7195
                • Instruction Fuzzy Hash: E31114B69003098FDB10DFAAC448BDEFBF4FB48324F10842AE519AB240C375A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • OleInitialize.OLE32(00000000), ref: 01505EA5
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: 27481b6d1eb1e9dd56f5d46cd64f9cc0a84a7584c7e9ca5450a5c9121b3289aa
                • Instruction ID: 8433e8df04f88eb5dca78338b15e036cdfb79a6f6352ad0c009226855ec85dee
                • Opcode Fuzzy Hash: 27481b6d1eb1e9dd56f5d46cd64f9cc0a84a7584c7e9ca5450a5c9121b3289aa
                • Instruction Fuzzy Hash: 7A1145B1800348CFCB10DFAAC488BCEBBF8FB48324F10845AE559AB240D375A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0150638F), ref: 0150722D
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: DispatchMessage
                • String ID:
                • API String ID: 2061451462-0
                • Opcode ID: 420151c407d71d88dd7f7e1aefa54691f9fb4146f93070a88caced11252dd0e9
                • Instruction ID: 6646fa574e8aea910168be5431e44c5b575f04f89bdef1fe80e2cfd47da387d9
                • Opcode Fuzzy Hash: 420151c407d71d88dd7f7e1aefa54691f9fb4146f93070a88caced11252dd0e9
                • Instruction Fuzzy Hash: 5E11E0B1D046498FCB10DF9AD544BDEBBF4BB88324F10852AE859A7240D374A645CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • OleInitialize.OLE32(00000000), ref: 01505EA5
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: f1bc44159f440c9ca97bec4061ab5441acbf9255b0d9f783f889addd5a20eba9
                • Instruction ID: 6c83643bcb588f62af63997ade389b40e2ef6a8769bce1229e0822b2c430102d
                • Opcode Fuzzy Hash: f1bc44159f440c9ca97bec4061ab5441acbf9255b0d9f783f889addd5a20eba9
                • Instruction Fuzzy Hash: EF1112B19043488FCB20DFAAC448BDEBBF8FB48324F108459E559AB740D375A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0150638F), ref: 0150722D
                Memory Dump Source
                • Source File: 00000002.00000002.575319418.0000000001500000.00000040.00000001.sdmp, Offset: 01500000, based on PE: false
                Similarity
                • API ID: DispatchMessage
                • String ID:
                • API String ID: 2061451462-0
                • Opcode ID: 23d998d03b3dc5e1c29d8aaee3c61a7f14be960c2c86827383fe25a26e57c1f2
                • Instruction ID: a57b6ad8a86527dedc85d9c256a22dadddd14245489220b076d5af050ec977f8
                • Opcode Fuzzy Hash: 23d998d03b3dc5e1c29d8aaee3c61a7f14be960c2c86827383fe25a26e57c1f2
                • Instruction Fuzzy Hash: 3411EDB1C046498FCB20DF9AD844B9EBBF4FB48224F10842AE859A7640D378A645CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 45e37466d72f3c7401076dd7861da4ed6713c7b3fca4a45263e39fc3dcd93309
                • Instruction ID: cedea35c2a870a8d071020ac322178998cb338cd352e64bc34f57faa3418a515
                • Opcode Fuzzy Hash: 45e37466d72f3c7401076dd7861da4ed6713c7b3fca4a45263e39fc3dcd93309
                • Instruction Fuzzy Hash: 92622F34A041098FEB25DFA4D850BAE7BB6FB85304F1180ADD20A6B394DF319D45DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fa54f1e0fdd6a69db47d01b8bb746b3383dcc0f829edf00eb23923c63099b511
                • Instruction ID: ad47ed8cf2e7c3ec7a7c5e87fc17928cd14188ad92608db9232f7bcf44d20463
                • Opcode Fuzzy Hash: fa54f1e0fdd6a69db47d01b8bb746b3383dcc0f829edf00eb23923c63099b511
                • Instruction Fuzzy Hash: 65029D70A002058FCF15DBB8D4886AE7BF2EF89315F15886AE506DB361EB39DC46CB51
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 947dde22dbb6a22a3d3907bbca41582e8d7eb27ebf3b69248980cff0d8a7b3e6
                • Instruction ID: 40fae6947e3d0902f1e524b81c1d98775c1a44df9959543b9daa69399dfe52e0
                • Opcode Fuzzy Hash: 947dde22dbb6a22a3d3907bbca41582e8d7eb27ebf3b69248980cff0d8a7b3e6
                • Instruction Fuzzy Hash: BC126A7460010ADFCF15CF68C985EAABFB2BF88310F158556E9069B3A6C770ED91CB61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba366f1f8fe72102102b42eef608facee4b1061d88663986a8099bffb42fdf74
                • Instruction ID: ff95ac8cccf37b706762f689173c61d2a54a29065749e92555becc022fb86e0b
                • Opcode Fuzzy Hash: ba366f1f8fe72102102b42eef608facee4b1061d88663986a8099bffb42fdf74
                • Instruction Fuzzy Hash: 08A1F170B082458FDF11CB68C9447AABFB2AF89308F24C1ABD5199F3A6D775C805C752
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 817d2518b61d3fca4baa16524ab8a2927dabeae5ea68094b9eb1f5a6183e562d
                • Instruction ID: 66f428e79f7a6ca5db4e3703debbd7ea60cd3ec72aca42437afb8dc480171993
                • Opcode Fuzzy Hash: 817d2518b61d3fca4baa16524ab8a2927dabeae5ea68094b9eb1f5a6183e562d
                • Instruction Fuzzy Hash: BE91BF743042118FDF259B68D854B6F7BE6BBC9204F05846AE906CB3A5DF75CC06C7A2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 78248ba5b7f9fd87dc0e5be5ab0e8d1596d20d0116fa8476f6466e833365bf41
                • Instruction ID: ce07f485a9b67d250618c2a1a023db22d2f0e22b4725fc9bb68dc88f251c31ea
                • Opcode Fuzzy Hash: 78248ba5b7f9fd87dc0e5be5ab0e8d1596d20d0116fa8476f6466e833365bf41
                • Instruction Fuzzy Hash: A9815E35A00605CFDF54CF6DC484A6ABFBABF89214B15816AE509DB371DB31EC41CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b47e852ae01fec5e4670f26f98c77c488d73feb43fa6403227ec9142900101f6
                • Instruction ID: 3c58ba1c495a64b0b141ffe73977e33cfabec1183dfeb27267cf9b942f9adc80
                • Opcode Fuzzy Hash: b47e852ae01fec5e4670f26f98c77c488d73feb43fa6403227ec9142900101f6
                • Instruction Fuzzy Hash: A7410674600119AFCB159F69D848EAA7FA5FF48710F1040AAF916CB3B1CBB1DD51CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 25ba16b707c35ffcd5b86492eeb71bf9ea4a43ea640ccf6cb727d37459d6741a
                • Instruction ID: 5165327fa6ed0127387d9e49dd47af63e9f70e4274b303986696d44ada097ff1
                • Opcode Fuzzy Hash: 25ba16b707c35ffcd5b86492eeb71bf9ea4a43ea640ccf6cb727d37459d6741a
                • Instruction Fuzzy Hash: 9C21C4353002026BDF2616398CA4E3F2E9BDFC4558B1440BAE502DFBB5EFB5C8029791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f73392e031ab812b4437542342a0760cdee2fc71ca523718570a2dbb02c587b6
                • Instruction ID: 2c732f1fded69dac8ef78b7c0f9c3dd38b0165dbb6b26fe509824e3d4826db04
                • Opcode Fuzzy Hash: f73392e031ab812b4437542342a0760cdee2fc71ca523718570a2dbb02c587b6
                • Instruction Fuzzy Hash: A921B3383002016BDF2516298894E7F2A8BEFC4658F1480BAE502DFBB5EFB5C842D791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c4238cad567ed4ebe6b8e32d8c7c0555e3db4e84ba938c9417e4b70479d6aeb9
                • Instruction ID: 3d02dd2ce486a1580d9f2f25bed71c5a6c104436f3feb0259304b4cad6eba625
                • Opcode Fuzzy Hash: c4238cad567ed4ebe6b8e32d8c7c0555e3db4e84ba938c9417e4b70479d6aeb9
                • Instruction Fuzzy Hash: D421807030415AAFDF01CF299844E7B7FA9EB89310F044027E91AC7761DAB5DC02CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 765fc07d4d62c8c913d63785e948e94acb8ec6c7f5cb0c798af66140504c0a54
                • Instruction ID: 184334ed8d67ce3c1887c580d8029724741a118aac4b439c8a4eeb9af6433e90
                • Opcode Fuzzy Hash: 765fc07d4d62c8c913d63785e948e94acb8ec6c7f5cb0c798af66140504c0a54
                • Instruction Fuzzy Hash: 6421A1357016129BCB299A29D86852FBBAAFBC4764705417AE90ADB3A4DF70DC06C7C0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96ac8be760351f55340d2204a6c9e0cb5fe8c2186c4edfffe254212604c92475
                • Instruction ID: 9c073577e03e6d60604af800496340c7ce805ae62a7f0e4917bf0a2fe31e8af9
                • Opcode Fuzzy Hash: 96ac8be760351f55340d2204a6c9e0cb5fe8c2186c4edfffe254212604c92475
                • Instruction Fuzzy Hash: CE211A70E0020A9FCB44DFA8D5845EDBBF2FB88324F15856ED508AB721D3359942CB94
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4777f700f5d5b3183a51f5d9f710e435c884dd616e52081f9d38c12da9344c1
                • Instruction ID: 3bb1f5e578b63f81abf648eb50181422c1fe6d276e3bc8c07c9922743e772f89
                • Opcode Fuzzy Hash: f4777f700f5d5b3183a51f5d9f710e435c884dd616e52081f9d38c12da9344c1
                • Instruction Fuzzy Hash: 1E01847160415AAB9F00CE6A9C54EABBFEDEB89220B044437E51AC2211DBB1D901CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a021b3f26dcdceb6296d22050ec8b9458e998b3d8f8984b3d9b45e01082fe88
                • Instruction ID: f8ca169b2b614cd0e5f171f531ba43d018781b165abf33e74b330e65e801edee
                • Opcode Fuzzy Hash: 6a021b3f26dcdceb6296d22050ec8b9458e998b3d8f8984b3d9b45e01082fe88
                • Instruction Fuzzy Hash: 08F08271F002159B8F50FBB9941829FBAE9AB88664B11047AD509E7304FA348D0587D1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c5fd89a772409ba7c3a6159fdb88c5b93220f3d75428722f694ae1fbccc4036a
                • Instruction ID: c64494e63191cc404aa33e56cab59aca0499560a6db602bbb4cbdedaef1eae89
                • Opcode Fuzzy Hash: c5fd89a772409ba7c3a6159fdb88c5b93220f3d75428722f694ae1fbccc4036a
                • Instruction Fuzzy Hash: 9AF0A771E042159FC790DFAC94085EE7EF4EBC8261711417BD509D7210E7748E059BD0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 876e2ef1c90521c7e8e01c8bf1fd20b73eb772feb80c4bda7d18f17db7b165c4
                • Instruction ID: 1d05e6edd2d2c50d0fdab2e9ddc3b12eacaf4d0d3089718264164d720f67e8c2
                • Opcode Fuzzy Hash: 876e2ef1c90521c7e8e01c8bf1fd20b73eb772feb80c4bda7d18f17db7b165c4
                • Instruction Fuzzy Hash: 56E04871E041199F4B50DBBDA8055EF7FF9EACC251B11017AE51DE3300EA704A018BE1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2d68391b66314f11ac2969929ff493a79363c5b55ace9273956a19713b510fec
                • Instruction ID: 0446b0684b82f75b0b9a66c93c4eebfa6ea2ad7d67f62fb99c6b26b1cb8814e8
                • Opcode Fuzzy Hash: 2d68391b66314f11ac2969929ff493a79363c5b55ace9273956a19713b510fec
                • Instruction Fuzzy Hash: 0FD0673AB10009DF8B049F98E840CDDBB76FB98225B148116FA15A7265CA319921DB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5d4beba744844b15346852300b6eb987d54b59068d245e73f746362071f1d55d
                • Instruction ID: 32049c2b3ff5ce045a92d7d6dccbab26e154388a7605deedf3225bdd57d41138
                • Opcode Fuzzy Hash: 5d4beba744844b15346852300b6eb987d54b59068d245e73f746362071f1d55d
                • Instruction Fuzzy Hash: F4D05E302082014BCB50BBB0EA856193726EBC0309F018822E0088E664DF7489169B52
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000002.00000002.574833560.0000000001490000.00000040.00000001.sdmp, Offset: 01490000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6d78b06c875d3216773ad078198d50076ee2141782249578e3caea9b3310a6e2
                • Instruction ID: 6f16c4f8653990a9447acb96a71aef0424252b7307bb15e926d6c59550e1fbd8
                • Opcode Fuzzy Hash: 6d78b06c875d3216773ad078198d50076ee2141782249578e3caea9b3310a6e2
                • Instruction Fuzzy Hash: E2C012301083065A8A90BFB1F845426331EA6C03087408D21E10C49124DF7499159B95
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions