Loading ...

Play interactive tourEdit tour

Analysis Report FYI.exe

Overview

General Information

Sample Name:FYI.exe
Analysis ID:339364
MD5:4768fad22f989c9ac940775ca46f91f6
SHA1:78f2e47fbcd50d77b8c0ea5e07209a2b1a79c45e
SHA256:275b79db451178b96e4872f9164b8b89f25a5f22ff8ba5f983d555cb3972a95d
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Startup

  • System is w10x64
  • FYI.exe (PID: 7132 cmdline: 'C:\Users\user\Desktop\FYI.exe' MD5: 4768FAD22F989C9AC940775CA46F91F6)
    • WerFault.exe (PID: 4832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      Process Memory Space: FYI.exe PID: 7132JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: FYI.exe PID: 7132JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for submitted fileShow sources
          Source: FYI.exeVirustotal: Detection: 28%Perma Link
          Source: FYI.exeReversingLabs: Detection: 13%
          Machine Learning detection for sampleShow sources
          Source: FYI.exeJoe Sandbox ML: detected
          Source: FYI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: FYI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: dwmapi.pdb4 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ml.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: clr.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: .ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: bcrypt.pdb& source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdbp source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscoree.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdbn source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb> source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ~IC:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: clrjit.pdbD source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdbR source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdbH source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: profapi.pdbv source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: WLDP.pdb\ source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb* source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Drawing.pdb`i source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDSD source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdbz source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdbN source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.354082981.00000000007B3000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: clrjit.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: C:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: wUxTheme.pdb8 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ore.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbt source: WER7630.tmp.dmp.4.dr
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdbl source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.pdbP source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: j,C:\Windows\System.pdb source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
          Source: FYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_001A90130_2_001A9013
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2C62C0_2_00A2C62C
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2E8A00_2_00A2E8A0
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2E8900_2_00A2E890
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B491D0_2_057B491D
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B0BD80_2_057B0BD8
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B0BC90_2_057B0BC9
          Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
          Source: FYI.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: FYI.exe, 00000000.00000000.335501038.000000000027F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameELEMDESC.exe@ vs FYI.exe
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs FYI.exe
          Source: FYI.exe, 00000000.00000002.420908205.0000000005720000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs FYI.exe
          Source: FYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemtIhhvyBlBQJqvuFVfaUQvZuNNNzVTchmZnhg.exe4 vs FYI.exe
          Source: FYI.exeBinary or memory string: OriginalFilenameELEMDESC.exe@ vs FYI.exe
          Source: FYI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: classification engineClassification label: mal76.troj.evad.winEXE@2/4@0/1
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7132
          Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER7630.tmpJump to behavior
          Source: FYI.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\FYI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: FYI.exeVirustotal: Detection: 28%
          Source: FYI.exeReversingLabs: Detection: 13%
          Source: C:\Users\user\Desktop\FYI.exeFile read: C:\Users\user\Desktop\FYI.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\FYI.exe 'C:\Users\user\Desktop\FYI.exe'
          Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
          Source: C:\Users\user\Desktop\FYI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\FYI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: FYI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: FYI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: dwmapi.pdb4 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ml.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: clr.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: .ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: bcrypt.pdb& source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdbp source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscoree.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdbn source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb> source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ~IC:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: clrjit.pdbD source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdbR source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdbH source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: profapi.pdbv source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: WLDP.pdb\ source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb* source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Drawing.pdb`i source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDSD source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdbz source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdbN source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.354082981.00000000007B3000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: clrjit.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: C:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: wUxTheme.pdb8 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ore.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbt source: WER7630.tmp.dmp.4.dr
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdbl source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.pdbP source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: j,C:\Windows\System.pdb source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: FYI.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.FYI.exe.1a0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.FYI.exe.1a0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: initial sampleStatic PE information: section name: .text entropy: 7.25136431131
          Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\FYI.exe TID: 7136Thread sleep time: -51794s >= -30000sJump to behavior
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: WerFault.exe, 00000004.00000002.404531746.0000000004867000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
          Source: WerFault.exe, 00000004.00000003.370449184.00000000048D4000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\FYI.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Users\user\Desktop\FYI.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\FYI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing11Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Information Discovery12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          FYI.exe28%VirustotalBrowse
          FYI.exe13%ReversingLabsWin32.Trojan.Generic
          FYI.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                      high

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious

                                      Private

                                      IP
                                      192.168.2.1

                                      General Information

                                      Joe Sandbox Version:31.0.0 Red Diamond
                                      Analysis ID:339364
                                      Start date:13.01.2021
                                      Start time:21:41:53
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 7m 25s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:FYI.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:23
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal76.troj.evad.winEXE@2/4@0/1
                                      EGA Information:Failed
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 47
                                      • Number of non-executed functions: 7
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.88.21.125, 51.104.139.180, 92.122.213.194, 92.122.213.247, 168.61.161.212, 93.184.221.240, 51.103.5.159, 20.54.26.129, 52.155.217.156, 23.210.248.85
                                      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      21:42:52API Interceptor1x Sleep call for process: FYI.exe modified
                                      21:43:18API Interceptor1x Sleep call for process: WerFault.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      No context

                                      Domains

                                      No context

                                      ASN

                                      No context

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_FYI.exe_decd39a630c9d4191a275eb268c8ae351d3d61e4_41043005_12becc4f\Report.wer
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):14450
                                      Entropy (8bit):3.771478576899414
                                      Encrypted:false
                                      SSDEEP:192:nWNnkgHBUZMXqaKeCiynKz/u7sCS274ItM7:WNnLBUZMXqav/u7sCX4ItM7
                                      MD5:19C943447658E2C23D5AE333BA6CC6E9
                                      SHA1:EAFE017FC8DB5497D1026188C9C16D08E242E88F
                                      SHA-256:9082B7E39BF17FC2F26A834C7A2E9898906B4C706ABCDB19967DB7E364FAE8E8
                                      SHA-512:CE7E65A665B350D1AE8B7E0521225EB435EE5CE76B35C8BC8F7B3B5EDAAD29C89B716317545A92C4D57C88A91217D6CB0C1C69503C3BACF50433EC48AFCB22DC
                                      Malicious:true
                                      Reputation:low
                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.5.0.7.6.5.7.6.7.8.1.8.0.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.5.0.7.6.5.8.3.3.2.8.6.4.9.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.0.7.1.5.4.9.9.-.a.1.9.a.-.4.9.e.6.-.b.4.a.1.-.8.6.a.8.b.c.f.2.6.e.9.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.c.9.8.3.9.1.-.a.4.c.8.-.4.4.e.5.-.8.2.2.7.-.b.5.1.4.f.3.4.9.4.a.a.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.Y.I...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.L.E.M.D.E.S.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.d.c.-.0.0.0.1.-.0.0.1.7.-.8.7.0.4.-.8.c.1.6.3.8.e.a.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.a.5.6.1.8.9.0.8.5.5.9.0.7.6.5.f.e.8.8.b.c.a.2.8.e.0.e.8.6.d.8.0.0.0.0.0.0.0.0.!.0.0.0.0.7.8.f.2.e.4.7.f.b.c.d.5.0.d.7.7.b.8.c.0.e.a.5.e.0.7.2.0.9.a.2.b.1.a.7.9.c.4.5.e.
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER7630.tmp.dmp
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 14 streams, Thu Jan 14 05:42:58 2021, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):268581
                                      Entropy (8bit):4.473454946615885
                                      Encrypted:false
                                      SSDEEP:3072:V0A9UCgUrU9gIOgF5YvVm1oiwyMHEEI0lCR1EO0jd+pSabt7:VnTj49RpDYs1j+I0lCR9pS8
                                      MD5:691D98FD805127129A2CAC03D6C32AB4
                                      SHA1:C5C8D660EC5DAFBC973FF31100B10DD141C89834
                                      SHA-256:BDF5DC92ACD40D607BA423EA47B1C2EF54A03F782572E5D0FA0FE025D7C01849
                                      SHA-512:B24108C751D560C5663AEEF4111B083014692A15E8D43ACF30335E11C7C7B6B94D54595128FF0C8DA5E8218B639825EC1E454D15FEE32A56F87D33DF16AE1345
                                      Malicious:false
                                      Reputation:low
                                      Preview: MDMP....... .........._...................U...........B......."......GenuineIntelW...........T.............._.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER8053.tmp.WERInternalMetadata.xml
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8374
                                      Entropy (8bit):3.69482804710006
                                      Encrypted:false
                                      SSDEEP:192:Rrl7r3GLNiQZ6h6YJrSUIFlggmfZfSdCprF89bYRsfc+om:RrlsNi26h6YVSUIFigmfBSnYKfcY
                                      MD5:91110FF09C7FC442779F7EF580769F22
                                      SHA1:57C9D5D4865F64BE2ED5A5E5EA629449D9482287
                                      SHA-256:56ECD21B10ED2EC7F9BDC0358279EBC0222EC5B50ACD51C7ED0FCE0D1837284F
                                      SHA-512:4D69FD3214085D778645788B591FE49B00272AD667B3EA2222FBA895DDFCC3D6F3A1E194A7ECBCCAA9D6A691FC64FEFBAD3744F2251B60303BB02F5AAE712790
                                      Malicious:false
                                      Reputation:low
                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.3.2.<./.P.i.d.>.......
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER8342.tmp.xml
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4703
                                      Entropy (8bit):4.452410891996699
                                      Encrypted:false
                                      SSDEEP:48:cvIwSD8zsFJgtWI9yMWSC8Bz8fm8M4J0eH2FC+q8vOeHmHwbeOCd:uITfftlSNeJLK2Hiend
                                      MD5:A8539EC6F218065D2C5A263606E75913
                                      SHA1:F1B63F2D4B25EC3C75BA64C5F856F302947D4E33
                                      SHA-256:5CBFED0D236862A5F0BAD8621CCB4BDAD446DB68F61EF6C21837EE21B1735EB6
                                      SHA-512:63825E3006D33D138C1553043B397751F83FFD8456C4B2FF0DA870D8133CE151C0F6093B495D89A858EF7036AB3AB9C3BC8545D8910385B4114700449720CD74
                                      Malicious:false
                                      Reputation:low
                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="815933" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.0302421461740785
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:FYI.exe
                                      File size:930816
                                      MD5:4768fad22f989c9ac940775ca46f91f6
                                      SHA1:78f2e47fbcd50d77b8c0ea5e07209a2b1a79c45e
                                      SHA256:275b79db451178b96e4872f9164b8b89f25a5f22ff8ba5f983d555cb3972a95d
                                      SHA512:74d822b0b1374af9f53b603c145a58482b843aab9fcab43f1c64cc7c4ab6d189998d1964ad2e300d52f124d827175aaea3e3f78a836d07906a703997b5a8ad52
                                      SSDEEP:12288:RK+ympVh1Iw6lLkTYBt12mS0E4h9gwi4z3d87OGMA:aQVUxl6YBtr51iI3d87LMA
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...h.._..............P..J...........i... ........@.. ....................................@................................

                                      File Icon

                                      Icon Hash:000d233320000000

                                      Static PE Info

                                      General

                                      Entrypoint:0x4c691a
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x5FFEC368 [Wed Jan 13 09:54:48 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                      Entrypoint Preview

                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc68c80x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x1e43c.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xc49200xc4a00False0.684223269628data7.25136431131IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xc80000x1e43c0x1e600False0.268614969136data3.13907628015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xe80000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xc82200x468GLS_BINARY_LSB_FIRST
                                      RT_ICON0xc86880x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294901502, next used block 4294901501
                                      RT_ICON0xc97300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294704636, next used block 4294704380
                                      RT_ICON0xcbcd80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294573050, next used block 4294638330
                                      RT_ICON0xcff000x10828data
                                      RT_ICON0xe07280x5797PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                      RT_GROUP_ICON0xe5ec00x5adata
                                      RT_VERSION0xe5f1c0x334data
                                      RT_MANIFEST0xe62500x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                      Imports

                                      DLLImport
                                      mscoree.dll_CorExeMain

                                      Version Infos

                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2011
                                      Assembly Version1.0.0.0
                                      InternalNameELEMDESC.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameFileReplacement
                                      ProductVersion1.0.0.0
                                      FileDescriptionFileReplacement
                                      OriginalFilenameELEMDESC.exe

                                      Network Behavior

                                      Network Port Distribution

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 13, 2021 21:42:56.448657990 CET6426753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:42:56.496658087 CET53642678.8.8.8192.168.2.6
                                      Jan 13, 2021 21:42:58.081685066 CET4944853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:42:58.132519007 CET53494488.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:04.604155064 CET6034253192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:04.655970097 CET53603428.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:10.414232969 CET6134653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:10.462306976 CET53613468.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:17.180489063 CET5177453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:17.238306999 CET53517748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:19.978152037 CET5602353192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:20.026010036 CET53560238.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:23.018889904 CET5838453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:23.066829920 CET53583848.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:25.248848915 CET6026153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:25.296953917 CET53602618.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:26.403151989 CET5606153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:26.451338053 CET53560618.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:27.410645008 CET5833653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:27.461308002 CET53583368.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:28.361809969 CET5378153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:28.410039902 CET53537818.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:29.513449907 CET5406453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:29.564551115 CET53540648.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:30.486542940 CET5281153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:30.537297964 CET53528118.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:30.669805050 CET5529953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:30.717756033 CET53552998.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:31.732527018 CET6374553192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:31.783268929 CET53637458.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:32.202323914 CET5005553192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:32.258920908 CET53500558.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:33.146409988 CET6137453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:33.197583914 CET53613748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:35.430470943 CET5033953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:35.486900091 CET53503398.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:36.609778881 CET6330753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:36.657830000 CET53633078.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:37.779505014 CET4969453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:37.831496954 CET53496948.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:37.985586882 CET5498253192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:38.044173002 CET53549828.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:39.084952116 CET5001053192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:39.132936954 CET53500108.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:40.273437023 CET6371853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:40.325709105 CET53637188.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:41.292197943 CET6211653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:41.340086937 CET53621168.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:46.599957943 CET6381653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:46.668344975 CET5501453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:46.676014900 CET53638168.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:46.727622986 CET53550148.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:47.335315943 CET6220853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:47.399907112 CET53622088.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:48.047955990 CET5757453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:48.096183062 CET53575748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:48.557751894 CET5181853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:48.616976976 CET53518188.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:49.063502073 CET5662853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:49.121870041 CET53566288.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:49.651891947 CET6077853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:49.710367918 CET53607788.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:50.277299881 CET5379953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:50.339318991 CET53537998.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:51.072112083 CET5468353192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:51.129157066 CET53546838.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:52.179287910 CET5932953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:52.236133099 CET53593298.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:52.765718937 CET6402153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:52.822047949 CET53640218.8.8.8192.168.2.6
                                      Jan 13, 2021 21:44:13.033729076 CET5612953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:44:13.089921951 CET53561298.8.8.8192.168.2.6
                                      Jan 13, 2021 21:44:14.236213923 CET5817753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:44:14.294318914 CET53581778.8.8.8192.168.2.6

                                      Code Manipulations

                                      Statistics

                                      CPU Usage

                                      Click to jump to process

                                      Memory Usage

                                      Click to jump to process

                                      High Level Behavior Distribution

                                      Click to dive into process behavior distribution

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:21:42:47
                                      Start date:13/01/2021
                                      Path:C:\Users\user\Desktop\FYI.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\FYI.exe'
                                      Imagebase:0x1a0000
                                      File size:930816 bytes
                                      MD5 hash:4768FAD22F989C9AC940775CA46F91F6
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:21:42:54
                                      Start date:13/01/2021
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
                                      Imagebase:0x9d0000
                                      File size:434592 bytes
                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Disassembly

                                      Code Analysis

                                      Reset < >

                                        Executed Functions

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00A2BB48
                                        • GetCurrentThread.KERNEL32 ref: 00A2BB85
                                        • GetCurrentProcess.KERNEL32 ref: 00A2BBC2
                                        • GetCurrentThreadId.KERNEL32 ref: 00A2BC1B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: cbe215b9b8bfd658f6b9b32c7beba85072ab6419704be8e96e54663f36f5ade3
                                        • Instruction ID: f45070950a2c6f2aa7e5ad2beec7c806c14d0d3a9dbb8133b739def0a808b6b4
                                        • Opcode Fuzzy Hash: cbe215b9b8bfd658f6b9b32c7beba85072ab6419704be8e96e54663f36f5ade3
                                        • Instruction Fuzzy Hash: 035152B0D006498FDB54CFA9D688BDEBBF0EF88304F248569E449A7250DB749C84CF65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00A2BB48
                                        • GetCurrentThread.KERNEL32 ref: 00A2BB85
                                        • GetCurrentProcess.KERNEL32 ref: 00A2BBC2
                                        • GetCurrentThreadId.KERNEL32 ref: 00A2BC1B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 8c89aaa3c26ec4001936a53edb5aede0c24c19f43ca4be3d4ce6a905f7bffab3
                                        • Instruction ID: d458867da5191e3f33b54470efc48d94cc26507cf9a150e487705b38a3f1dea7
                                        • Opcode Fuzzy Hash: 8c89aaa3c26ec4001936a53edb5aede0c24c19f43ca4be3d4ce6a905f7bffab3
                                        • Instruction Fuzzy Hash: 1A5153B0D006498FDB54CFA9D688BDEBBF0EF48314F248569E449A7350DB74AC84CB65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29A36
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: e8bf1e7cffb5b7d987406128acf53abaf09b37eed6514d9e658df4e6a1e147d2
                                        • Instruction ID: c73a7046a0ff58dba184185ed0508e385ee6baba823772aef7cc85b7307ff6ed
                                        • Opcode Fuzzy Hash: e8bf1e7cffb5b7d987406128acf53abaf09b37eed6514d9e658df4e6a1e147d2
                                        • Instruction Fuzzy Hash: 86712270A00B158FD724DF6AE04579BBBF1FF88704F048A2EE48AD7A40DB74E9458B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A2BD97
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: e202e654988cc04005da3c2f3755b2a069acc38d13567eb7b4bf3a5c1b4f7ce0
                                        • Instruction ID: 0bf3fe6992db3d802caab649a5251ccbb1fee6606328c871b6e709f957b665d0
                                        • Opcode Fuzzy Hash: e202e654988cc04005da3c2f3755b2a069acc38d13567eb7b4bf3a5c1b4f7ce0
                                        • Instruction Fuzzy Hash: 8A2103B59002189FDB10CFA9D584ADEBBF5FB48320F14841AE914A3210C378A945CF60
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A2BD97
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: e68453b52cfdb6df4237e100ffcfe97e51fd7367692a3148a60fd15470590866
                                        • Instruction ID: ea771eaafa781bb2967fd099082ba9a6bec43f930225075f290cfeecf8020112
                                        • Opcode Fuzzy Hash: e68453b52cfdb6df4237e100ffcfe97e51fd7367692a3148a60fd15470590866
                                        • Instruction Fuzzy Hash: 4721C4B59002599FDB10CF99D584ADEBBF8FB48324F15841AE914A7310D778A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29AB1,00000800,00000000,00000000), ref: 00A29CC2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 5d91956a68a8f66dfff2a15fbed42a3ff018813d233a7ce7ec17cd29cb9b14e7
                                        • Instruction ID: e2e102c02d57ed081df451d624beed05bd8e2e3a9f2abb3ecd7341bb7945670c
                                        • Opcode Fuzzy Hash: 5d91956a68a8f66dfff2a15fbed42a3ff018813d233a7ce7ec17cd29cb9b14e7
                                        • Instruction Fuzzy Hash: 571142B29042488FCB10CF9AD544BDFFBF4EB88720F00842AE919A7600C379A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29AB1,00000800,00000000,00000000), ref: 00A29CC2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: babbf01b358910632efcb523c7378f329bc8833c8871f42337ab55fe6b1415e8
                                        • Instruction ID: f6b303fca8480babe785edbbee67954aee8ccc5a8db002d77914245b4eae6c87
                                        • Opcode Fuzzy Hash: babbf01b358910632efcb523c7378f329bc8833c8871f42337ab55fe6b1415e8
                                        • Instruction Fuzzy Hash: CB1117B6D002498FDB10CF99D444ADFFBF4EF88710F15842AD519A7600C774A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29A36
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: f57f1a853f4b24513a06f79ede040f8076c0367adc85adb902bd035c2fcc8a37
                                        • Instruction ID: 5d3891d3e912a4320ad1383bab8605fc868167c29223b0626523b155fb59d5f9
                                        • Opcode Fuzzy Hash: f57f1a853f4b24513a06f79ede040f8076c0367adc85adb902bd035c2fcc8a37
                                        • Instruction Fuzzy Hash: 4C11FDB5C002598BCB10CF9AD444ADEBBF8AB88724F15842AD829A7600C378A546CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 5b6e5efa392f08297b528a30fa942119253e08aa233df45e46563a9365d21deb
                                        • Instruction ID: 53c48fe7d2eb25fb11f6a7ad145c53c845bd34edd65908df78a5d5d1551e2841
                                        • Opcode Fuzzy Hash: 5b6e5efa392f08297b528a30fa942119253e08aa233df45e46563a9365d21deb
                                        • Instruction Fuzzy Hash: CB41F874A02219CFEB50DFA9D948B9EBBB2FB08315F0089A9D405E7344DB759E84CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: 4079db69799c7039dfac3667548534d3c47413b78cfc1ba8b0e431a759b10197
                                        • Instruction ID: 4cbd255d80d33798baf46e99923d069194e469d6b6e396eff194e158c5e954a9
                                        • Opcode Fuzzy Hash: 4079db69799c7039dfac3667548534d3c47413b78cfc1ba8b0e431a759b10197
                                        • Instruction Fuzzy Hash: 66113470901318CFEB60DFA8D948B9EBBB1FB05315F1059AAD429B7284D7B59E80CF11
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: 8e2d17ee3c5cda53833ace6acf2cc813e3539150d43c81f0e1b592a070de70f1
                                        • Instruction ID: 58d00c8af11d8032540c8a3360fcd8f38b69464e6dfcdf2e0020934298a56d85
                                        • Opcode Fuzzy Hash: 8e2d17ee3c5cda53833ace6acf2cc813e3539150d43c81f0e1b592a070de70f1
                                        • Instruction Fuzzy Hash: ACF01D34900224CFEB18DF65D888BECB7B1FB05705F0096A5D219A7280C7758985DF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 6d85cca0f8e47a54d4b37f020ec3391f8fab7c4aa88d04640ea0e60e14dead37
                                        • Instruction ID: 0e9b57b988470f03284550de0475a593f06f94a648660d5eec6e38bf28e98379
                                        • Opcode Fuzzy Hash: 6d85cca0f8e47a54d4b37f020ec3391f8fab7c4aa88d04640ea0e60e14dead37
                                        • Instruction Fuzzy Hash: 5BF01774C04318CFEB50DFA8D4487EDBBF1FB09315F101626D216A7284D3B54985DB00
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5fcc4cd756739901ebf4ff4d4f7cb3140812860f76f667ab7b3bca4885375512
                                        • Instruction ID: e2d9875be5e73525eadc64a93aa7a5b47841081ae1a9f9da2a87bc98391d9b2e
                                        • Opcode Fuzzy Hash: 5fcc4cd756739901ebf4ff4d4f7cb3140812860f76f667ab7b3bca4885375512
                                        • Instruction Fuzzy Hash: EA41B231B011198FDB18DFB8C8446FEB6EBAF89308B20847ED409DB344EB759C419792
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1aed7185c8d29f98ff600e93dfeeccb58915b9e809ab69e05c5ae9e947e4b04
                                        • Instruction ID: d60b0322598ae076dee124fd8df5201ea920ff576d709a3d334ce57d2b8850fc
                                        • Opcode Fuzzy Hash: c1aed7185c8d29f98ff600e93dfeeccb58915b9e809ab69e05c5ae9e947e4b04
                                        • Instruction Fuzzy Hash: ED41D074D14219CFEB04DFE9D889AEEBBB2FF49351F20442AD625B3240DBB45981DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9e69ff37dfb9e997678b40a17439fa7f8f6a3b7a90f2e9283c27afa23a2fc43
                                        • Instruction ID: d0de73bde75c5939d6a4fc6dd9501dd2973c583a34f5bafacc3b063ecbf43822
                                        • Opcode Fuzzy Hash: c9e69ff37dfb9e997678b40a17439fa7f8f6a3b7a90f2e9283c27afa23a2fc43
                                        • Instruction Fuzzy Hash: 7E41F374D04219CFDB14DFE5D885AEEBBB2FF49311F10442AE625A7340DBB45981DB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a70efafbdc9f237805c6bfc68422acbcb4f1dc64246ac6eadafa58dca71ec102
                                        • Instruction ID: be8b66c25effd468c160d15e5d2f14d4290f17cee1c1ce7e4ebdddae72f8fff5
                                        • Opcode Fuzzy Hash: a70efafbdc9f237805c6bfc68422acbcb4f1dc64246ac6eadafa58dca71ec102
                                        • Instruction Fuzzy Hash: 69317074E05218DBEB04CFA6E484BEDBBB6FF89304F109029D626B7340DBB15845CB55
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0bdca37935d260a41ee2c9226cae6d8888df63c6e23852953cdd22b6055d3076
                                        • Instruction ID: 0096a2f9de3c50bb8c758a9416e9a2412c3c80a85414a2615369567ba34bff0c
                                        • Opcode Fuzzy Hash: 0bdca37935d260a41ee2c9226cae6d8888df63c6e23852953cdd22b6055d3076
                                        • Instruction Fuzzy Hash: 2D3154B4D09208DFDB05DFE9D4456EEBFB1EB09350F1080AAC918A7351E7309A82DF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de283b8b5265aa697c939e515f119c049262b2cb612d884b1e33b4f2db4c20fc
                                        • Instruction ID: 7334dc455457fd36b6ceb5d3fc57047b56ce3407f08f75edf8c75d095143f932
                                        • Opcode Fuzzy Hash: de283b8b5265aa697c939e515f119c049262b2cb612d884b1e33b4f2db4c20fc
                                        • Instruction Fuzzy Hash: 75313C70E05218DBEB04DFA6D884BEEBBB6FF89301F009029E626B7340DBB158459B15
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2c281ca6e2924712f136b9ddb89ff46699c05029787212017870f7a41695424
                                        • Instruction ID: e63f6942c1dae3e41cf5bb2e706ab168d0e318393f41c9531012a22375e7616c
                                        • Opcode Fuzzy Hash: b2c281ca6e2924712f136b9ddb89ff46699c05029787212017870f7a41695424
                                        • Instruction Fuzzy Hash: 67319C30E001089FEB04DBB4D9587EEBBBBEF88354F108429D506A7280DB3598458B62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88e4e1c6806fe4e9cd8c675432deab779ffa5033a465ce58ebd099dd74757c3a
                                        • Instruction ID: f15f5d54f6c30af2e369f3c6cf7e4b57ab399eb1c26fe7f9802bd4228d15bc52
                                        • Opcode Fuzzy Hash: 88e4e1c6806fe4e9cd8c675432deab779ffa5033a465ce58ebd099dd74757c3a
                                        • Instruction Fuzzy Hash: 79316774D082098FDB05CFA9C490AEEBBF6FF48314F048066E905AB350DB71AA44DF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d9c1f5680d80856373d9853f436a02584a7af09bd4ea18017d918849fc883eb
                                        • Instruction ID: 04f59c17db5448767e70db97f849166b48134a7cf3164a8f2b6a8f5dc3a4fbb1
                                        • Opcode Fuzzy Hash: 2d9c1f5680d80856373d9853f436a02584a7af09bd4ea18017d918849fc883eb
                                        • Instruction Fuzzy Hash: FE31E374E142099FCB04CFA9D494AEEBBB5FF48314F14806AE905AB360DB70AA45DF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7e1d106ac9d2e956f57458564181401b1c5f4ec895add20b7dca84633985f30
                                        • Instruction ID: 85d18440494a0320d926e9e9ddcfec2d2e4d6721425d458b95edb4fa9ae12f54
                                        • Opcode Fuzzy Hash: b7e1d106ac9d2e956f57458564181401b1c5f4ec895add20b7dca84633985f30
                                        • Instruction Fuzzy Hash: 6F312574900218CFEB24CF69D948BEEBBB2FB08305F1089A8D519E3245DB749E80CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fe5ac440955d5733d11570d7fc7fe41095f4494ea2981b8e537add54c2e71b2e
                                        • Instruction ID: 6213b21ac71e72fb6f9291b2138a4cbe534abb6e04fd786636056c5f46a621f3
                                        • Opcode Fuzzy Hash: fe5ac440955d5733d11570d7fc7fe41095f4494ea2981b8e537add54c2e71b2e
                                        • Instruction Fuzzy Hash: 54119170B041059BEB6C9A7D8810BFF76A7FBC0B54F048529E916DB385EBB08E0197D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2bb40cc4bc55c2b3e2f136e7bcc57a31e2fb6ae160e3c984ad052a3da6c01a35
                                        • Instruction ID: 9168daecfbb1cf4dc1169951932c11e0e03b304f134b2c3687e99433fa01f20c
                                        • Opcode Fuzzy Hash: 2bb40cc4bc55c2b3e2f136e7bcc57a31e2fb6ae160e3c984ad052a3da6c01a35
                                        • Instruction Fuzzy Hash: 93118E75A002108FCB51EF78D409D9E7BF5EF4821031284BAE909CB315EB30DC11CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d0632b50d197a735141495b5d23e9b852fd677db788f226b615b06596d8679d0
                                        • Instruction ID: 2febdc40a4c150e6fa13617cfe9ad85aa86dd8a1ad3568a2eaf82fb58c6060ce
                                        • Opcode Fuzzy Hash: d0632b50d197a735141495b5d23e9b852fd677db788f226b615b06596d8679d0
                                        • Instruction Fuzzy Hash: 5011D0B4D05209DFCB44DFEAC4456AEBBF6FB88300F20816A8918A3344EB355A81CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd9e64a7f582b377253839b6684dd9b6a0ee4f0d8fd6e57077428d9b7358b557
                                        • Instruction ID: 6aaeb7a16cc308d6a1423d343fe2ad63ae4ceba4aa5fcb6ed1d80a4016339b25
                                        • Opcode Fuzzy Hash: fd9e64a7f582b377253839b6684dd9b6a0ee4f0d8fd6e57077428d9b7358b557
                                        • Instruction Fuzzy Hash: 17011630E00219DFDB84EFB9D8456EEBBF1FF48200F11952AE409E3644EB355A019BA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 42c1e5c1757cde15f6b89fb07514a18bc5a13d9dbc84f3a9809b2790e263dbe6
                                        • Instruction ID: 67a047dfe0ea5ed3750b758d26181377948ccb05d71b3de49383b30ded2a48eb
                                        • Opcode Fuzzy Hash: 42c1e5c1757cde15f6b89fb07514a18bc5a13d9dbc84f3a9809b2790e263dbe6
                                        • Instruction Fuzzy Hash: C401E870E00219DFCF44EFB9D8446EEBBF5BF48200F109529E419E7744EB7459018B90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f06737990462d6c1dd74d304684820a697c1da4cedd64ef2427858c45873f895
                                        • Instruction ID: d496367a7c036e40844a774d0c3a14c78d6237b0727eac6e52beb63c104ffb5e
                                        • Opcode Fuzzy Hash: f06737990462d6c1dd74d304684820a697c1da4cedd64ef2427858c45873f895
                                        • Instruction Fuzzy Hash: 72F02475D45208AFDB19DFA4D4093ECBBB1EB48314F0080A2D85897340D3794A92EF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb885881e79ee4cec67fbcb86862824ff7997bfd620b15bd4a67e03ccd0c111d
                                        • Instruction ID: e822791c4aab0c769ec23ccc72973dccbbf2d0fd383aba0d55635fcaffc62946
                                        • Opcode Fuzzy Hash: eb885881e79ee4cec67fbcb86862824ff7997bfd620b15bd4a67e03ccd0c111d
                                        • Instruction Fuzzy Hash: F5F024B190E2489FEB19CAB458857DC7FB6EF4220DF2404EAC84487382E2615D4BC746
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6f600279d00afa66a0edfad8315632c076663e8db86a239c030fead47f7ae0b
                                        • Instruction ID: 632a578d65bf3b5fcab64d1e249b86b9099c0d29d75d26b11a20c3f8fabf4cdf
                                        • Opcode Fuzzy Hash: a6f600279d00afa66a0edfad8315632c076663e8db86a239c030fead47f7ae0b
                                        • Instruction Fuzzy Hash: 3CF0273190E38C9FD716DBE0D4407ED3F3AAB42209F2445AAC64153352D3738E4ADB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c8d64da34b8cc8c44c19b207025fdea84487b9eb19254cf4a9b76ae43955890
                                        • Instruction ID: 9725571eb409ad8c6315c171484bda2989f925d0de66976090ea8cd8f07b5df0
                                        • Opcode Fuzzy Hash: 4c8d64da34b8cc8c44c19b207025fdea84487b9eb19254cf4a9b76ae43955890
                                        • Instruction Fuzzy Hash: 52F0E270809388DFDB22DBB884483DD7FB6EB06119F1401E68945D7282E6725984CB11
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 099534e51729f8a9b1f3a86aa2a8a2c49fb445dd5cf360466c627f180a170632
                                        • Instruction ID: cf1be642880dcb5690ce7baa0a4b351a880e800e1ec4c09cbd5cf4620fc53106
                                        • Opcode Fuzzy Hash: 099534e51729f8a9b1f3a86aa2a8a2c49fb445dd5cf360466c627f180a170632
                                        • Instruction Fuzzy Hash: 09E06DB184A3889FDB01CFA09855BEDBF38EB13218F0400DACA69E7252D6724A44DB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 874ee5c37e497fc85b485f75676763025e86002e70f893c24e2ed804c3f58386
                                        • Instruction ID: b390ba865baea9e52898f22ec0fe5d9aed9a25c90fbcd2070f2e8b0b22752a82
                                        • Opcode Fuzzy Hash: 874ee5c37e497fc85b485f75676763025e86002e70f893c24e2ed804c3f58386
                                        • Instruction Fuzzy Hash: A8E0D87080A3489FE701DFA0E4412DD7F75EB47249F1050E6C52D97341D6311E4ECB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16ecf9cf1b7c327e673423ee86a1b3788cba77a55bea8c03c2fa4460dd7aafd3
                                        • Instruction ID: cac52fdbc1a0538d417558f7f729e1a0e4ce04fdef709ac86ffefe5974a76d42
                                        • Opcode Fuzzy Hash: 16ecf9cf1b7c327e673423ee86a1b3788cba77a55bea8c03c2fa4460dd7aafd3
                                        • Instruction Fuzzy Hash: 4CE0867140E3889FE706CFA094456D93F7ADB13109F1410A5C51953351E6664E85C741
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1fe03a2b05640686b9dfaf8535e9abb7901a7f75eb115a542d08aa650bcaa7a4
                                        • Instruction ID: 37b13623e840bdd285184753ee53e588b7a947a0fd6fa754e21d7596e788c425
                                        • Opcode Fuzzy Hash: 1fe03a2b05640686b9dfaf8535e9abb7901a7f75eb115a542d08aa650bcaa7a4
                                        • Instruction Fuzzy Hash: 23E0927081A349EFDB12DFB494482DD7FB4EB06309F1440EAC849D3351E6714A95DB52
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8281e2cf51bd22bbf0db9c2f87ae0c7888d159ed5e32d7cf4bb59ebde38a458c
                                        • Instruction ID: 872b258415a8dca4ee2783f26483edd6627a502790b6f31512557f8cac4633ca
                                        • Opcode Fuzzy Hash: 8281e2cf51bd22bbf0db9c2f87ae0c7888d159ed5e32d7cf4bb59ebde38a458c
                                        • Instruction Fuzzy Hash: A2E03238D0520CEFCB58DFA8D408ADDBBBAEB58300F00C0AAA818A2300D3344A91EF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e29ff99b5f239057bb3d86e2e83504acde822d97ce015d426a6b03ac61f21e9e
                                        • Instruction ID: 97dd328ed1e9fe08635d6e2c49a4f3b6441a5bea6b8385999c2f0a529270bac4
                                        • Opcode Fuzzy Hash: e29ff99b5f239057bb3d86e2e83504acde822d97ce015d426a6b03ac61f21e9e
                                        • Instruction Fuzzy Hash: 30F0B2709002588FEB60DF28D84879CB7B1FB44305F0489AAC50BB2248DB751EC4CF01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e2563ab57c32d611d80c903f33e4a008edad26f10f44c07457743bc203ba0d7
                                        • Instruction ID: 989f9ae465cd59b1d8c955690f52d6c9842326684f0d0dc1c2e7c549fedb9352
                                        • Opcode Fuzzy Hash: 4e2563ab57c32d611d80c903f33e4a008edad26f10f44c07457743bc203ba0d7
                                        • Instruction Fuzzy Hash: 59E08CB0C1520CDFCB00DFE8D4097ADBBB8EB04201F1040A98808E3240E7701A80CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 26f419222056903d89e593ee5b0fc2014ccb740bcba6fc7a7e042e61de188dd2
                                        • Instruction ID: 96f8c11bc7f6b959f1af78a7ee28becf1c7e98db20de5cde5342b2f7f4447589
                                        • Opcode Fuzzy Hash: 26f419222056903d89e593ee5b0fc2014ccb740bcba6fc7a7e042e61de188dd2
                                        • Instruction Fuzzy Hash: 61E08C3081530CEFCB11DFE8D8097DEBBB8EB04309F2040A9C808A3240EA714A90CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e751006468ee9673851714cc3436c14bc35f348651fc60e66af46262a738fb9b
                                        • Instruction ID: ec77fa323c5e3a61acdf6e104e3cb4f75d55b1da62478c6292904f45650cc223
                                        • Opcode Fuzzy Hash: e751006468ee9673851714cc3436c14bc35f348651fc60e66af46262a738fb9b
                                        • Instruction Fuzzy Hash: 1CD0177080A20CDFDB04DBA5E406AAEBB79EB46306F1081A9891923384D7712E85DA95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 404fb4f2af71c3512dcb0cc408584a100c8a9bc8ec9e5c90610d94244a7dc95a
                                        • Instruction ID: 8a1b7c60b8138e99526c82d738a103ebe983694d301668ae04b05a0f73185ef1
                                        • Opcode Fuzzy Hash: 404fb4f2af71c3512dcb0cc408584a100c8a9bc8ec9e5c90610d94244a7dc95a
                                        • Instruction Fuzzy Hash: 68D0123490930CDBC715DBA4D4016ED7B7DEB41305F1085A9C55413344D7725985DB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2999db08191db657502961a8e04c7b1807196c2b65bc725cc0c096f8698a349f
                                        • Instruction ID: acbc9a435113e9fa6b18ed1a5bdde6d44ed2e4f8ac3d68c376f49490f24353ca
                                        • Opcode Fuzzy Hash: 2999db08191db657502961a8e04c7b1807196c2b65bc725cc0c096f8698a349f
                                        • Instruction Fuzzy Hash: AFD0177495A20CDFCB08EBB4E4456ADBBB8EB45305F1444A9C80963280E6702E96DB55
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f2ca55fa3d28f6444440e6dc8fb926c584fb57a28ab706a8b053f84637dded64
                                        • Instruction ID: 1b2a6713174ec7bcb8ae8aaad1f8c2f303047c034f2abd4c6331825bde686ec4
                                        • Opcode Fuzzy Hash: f2ca55fa3d28f6444440e6dc8fb926c584fb57a28ab706a8b053f84637dded64
                                        • Instruction Fuzzy Hash: 6AE0C270940229CFEB64DF29D8487E97B72FB48319F104AA9E50AA3254DB741FC0CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc495d0cf38ba073c4504b025e8429b5222eaa44c9512b886e85715a79fdd5ec
                                        • Instruction ID: f913eac7ac6a29cc5ccd0847c6a47790f0a4ce8610f74ba3b293cbae98c58de7
                                        • Opcode Fuzzy Hash: dc495d0cf38ba073c4504b025e8429b5222eaa44c9512b886e85715a79fdd5ec
                                        • Instruction Fuzzy Hash: C6D0227045B30CDFD704CAE1D802BEE733CEB03208F1004A8860D63240DBB20D40DA50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4a8ccc75a979f61cb9ea4ad3c3b11446ffd1a1e5be026cede9aef9da90720e6
                                        • Instruction ID: ffce2c2d545822100a7d154344800cba78c4aa3243607b11b4a23aab8278e0df
                                        • Opcode Fuzzy Hash: e4a8ccc75a979f61cb9ea4ad3c3b11446ffd1a1e5be026cede9aef9da90720e6
                                        • Instruction Fuzzy Hash: A0D0A73040930CDFD719CBA5D405BEA776CD702216F141468861D13140E7710D80DA44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 240e5955daf9a6ec21a1d783ec8a20398333bedb4ee18e626376697145ce7916
                                        • Instruction ID: dfb9720f3101560d935e7ded24e86a935e8b12271ae414edda4d9149382b742e
                                        • Opcode Fuzzy Hash: 240e5955daf9a6ec21a1d783ec8a20398333bedb4ee18e626376697145ce7916
                                        • Instruction Fuzzy Hash: 63E0F678E162289FEB61CF24C894AD9B7B1AB4A314F1045D5998EA7200E6705EC08F42
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b433e97c4b9e5b6269ddb4a2f66de0e35ff188895ed15cd403b30520bc1a082
                                        • Instruction ID: 925f6b63b3fe0f1c3683e4447bf040fd1058ab665a034de603ee3b0ce1ec6dc3
                                        • Opcode Fuzzy Hash: 3b433e97c4b9e5b6269ddb4a2f66de0e35ff188895ed15cd403b30520bc1a082
                                        • Instruction Fuzzy Hash: 9AD012305013198BE760DF54D80879D7771FB00309F011A55C009F3144D7750F848FA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Non-executed Functions

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID: V
                                        • API String ID: 0-1342839628
                                        • Opcode ID: be5e25816290bf0ded11cbed24538a0dfb68446d8e8035d41fdf4bcbbaa68685
                                        • Instruction ID: df5f40167b7a297c05fb274b27d751372b135748f05d4615762e66b0cbe44ec6
                                        • Opcode Fuzzy Hash: be5e25816290bf0ded11cbed24538a0dfb68446d8e8035d41fdf4bcbbaa68685
                                        • Instruction Fuzzy Hash: EA918DB0E106288FDB64DF69D888BCDBBF1FF48308F4185E5D54CA6205EB309A959F48
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.406853566.00000000001A2000.00000002.00020000.sdmp, Offset: 001A0000, based on PE: true
                                        • Associated: 00000000.00000002.406837050.00000000001A0000.00000002.00020000.sdmp Download File
                                        • Associated: 00000000.00000002.408712148.0000000000268000.00000002.00020000.sdmp Download File
                                        • Associated: 00000000.00000002.408724964.000000000026D000.00000002.00020000.sdmp Download File
                                        • Associated: 00000000.00000002.408929862.0000000000277000.00000002.00020000.sdmp Download File
                                        • Associated: 00000000.00000002.409160402.000000000027F000.00000002.00020000.sdmp Download File
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cf5bcab1d4c2c855bd59960f344472439f8941852ee5b4d141f30071e8bb835
                                        • Instruction ID: 22cbbf2a75929fef2d7f81fdef7d039415f6b433444c1735b8e74094992126d2
                                        • Opcode Fuzzy Hash: 9cf5bcab1d4c2c855bd59960f344472439f8941852ee5b4d141f30071e8bb835
                                        • Instruction Fuzzy Hash: E1A2486640E7C25FCB134B786DB56D17FB1AE27214B1E08C7C4C18F4A3D218699ADB63
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1be3c23017a245999fcc1a1976ee86d1661d5ac296d84a57116f33a3984e3e03
                                        • Instruction ID: 74ee1d55cf1a870091bc5f5793f515479f96355fb02eebfd13dd40aba8bffea6
                                        • Opcode Fuzzy Hash: 1be3c23017a245999fcc1a1976ee86d1661d5ac296d84a57116f33a3984e3e03
                                        • Instruction Fuzzy Hash: EA12AFF1411F668BE721DF65EC983897BA1B745328F906308D2613BAF5D7B8118ACF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8b67048c178738486da07f81984a86d94a85fb07f0cafe0219a04e536a0d13c
                                        • Instruction ID: a6c2a80d6711c7611f1174622b91b6b51aad33eafc792be30e993e7b46e6a4e1
                                        • Opcode Fuzzy Hash: c8b67048c178738486da07f81984a86d94a85fb07f0cafe0219a04e536a0d13c
                                        • Instruction Fuzzy Hash: B5A16E32E006298FCF15DFB9D9445AEBBB2FF85300B15857AE805BB221EB75A915CB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.415446880.0000000000A20000.00000040.00000001.sdmp, Offset: 00A20000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d8fdba986989a5552b32ab9f15d6977bd3f9b04e0ae77f6ed31d7984570a858
                                        • Instruction ID: 840b2cc9981f78285000724d0aabd8d07b1ea146133089efb83625c9ef388c69
                                        • Opcode Fuzzy Hash: 7d8fdba986989a5552b32ab9f15d6977bd3f9b04e0ae77f6ed31d7984570a858
                                        • Instruction Fuzzy Hash: 7CC126B1811F668BD711DF65EC983897BB1BB85328F615308D2617BAF0D7B4118ACF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cc668f9037bd7a6b26e30d23c3bf654b3b5e4931c16cacc8c3d145ac6ace3f6
                                        • Instruction ID: ff017ea9438a59bb3a7d3188a6385607d0afcd3b7b86d07595869699771723db
                                        • Opcode Fuzzy Hash: 7cc668f9037bd7a6b26e30d23c3bf654b3b5e4931c16cacc8c3d145ac6ace3f6
                                        • Instruction Fuzzy Hash: 34515B70A042088FD744EFBAE48179E7BB3EF88309F058939D5149B268EB755D898F81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.421206749.00000000057B0000.00000040.00000001.sdmp, Offset: 057B0000, based on PE: false
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ed8d8fd9629005cd15141d01589f71ef0f1305e5156f1fcc53740018af5b8379
                                        • Instruction ID: 262d904cfc1deb7aa4f7107ac35b2507d34f6cec411114862f676d0625f411da
                                        • Opcode Fuzzy Hash: ed8d8fd9629005cd15141d01589f71ef0f1305e5156f1fcc53740018af5b8379
                                        • Instruction Fuzzy Hash: 07514C70A042088FD744EFBAE49169E7BF3EF88309F058939D5149B268DB755D858F81
                                        Uniqueness

                                        Uniqueness Score: -1.00%