Loading ...

Play interactive tourEdit tour

Analysis Report FYI.exe

Overview

General Information

Sample Name:FYI.exe
Analysis ID:339364
MD5:4768fad22f989c9ac940775ca46f91f6
SHA1:78f2e47fbcd50d77b8c0ea5e07209a2b1a79c45e
SHA256:275b79db451178b96e4872f9164b8b89f25a5f22ff8ba5f983d555cb3972a95d
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

Startup

  • System is w10x64
  • FYI.exe (PID: 7132 cmdline: 'C:\Users\user\Desktop\FYI.exe' MD5: 4768FAD22F989C9AC940775CA46F91F6)
    • WerFault.exe (PID: 4832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      Process Memory Space: FYI.exe PID: 7132JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: FYI.exe PID: 7132JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for submitted fileShow sources
          Source: FYI.exeVirustotal: Detection: 28%Perma Link
          Source: FYI.exeReversingLabs: Detection: 13%
          Machine Learning detection for sampleShow sources
          Source: FYI.exeJoe Sandbox ML: detected
          Source: FYI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: FYI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: dwmapi.pdb4 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ml.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: clr.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: .ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: bcrypt.pdb& source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdbp source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscoree.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdbn source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb> source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ~IC:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: clrjit.pdbD source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdbR source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdbH source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: profapi.pdbv source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: WLDP.pdb\ source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb* source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Drawing.pdb`i source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDSD source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdbz source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdbN source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.354082981.00000000007B3000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: clrjit.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: C:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: wUxTheme.pdb8 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ore.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbt source: WER7630.tmp.dmp.4.dr
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdbl source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.pdbP source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: j,C:\Windows\System.pdb source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
          Source: WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
          Source: FYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_001A9013
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2C62C
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2E8A0
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_00A2E890
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B491D
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B0BD8
          Source: C:\Users\user\Desktop\FYI.exeCode function: 0_2_057B0BC9
          Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
          Source: FYI.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: FYI.exe, 00000000.00000000.335501038.000000000027F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameELEMDESC.exe@ vs FYI.exe
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs FYI.exe
          Source: FYI.exe, 00000000.00000002.420908205.0000000005720000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs FYI.exe
          Source: FYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemtIhhvyBlBQJqvuFVfaUQvZuNNNzVTchmZnhg.exe4 vs FYI.exe
          Source: FYI.exeBinary or memory string: OriginalFilenameELEMDESC.exe@ vs FYI.exe
          Source: FYI.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: classification engineClassification label: mal76.troj.evad.winEXE@2/4@0/1
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7132
          Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER7630.tmpJump to behavior
          Source: FYI.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\FYI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\FYI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: FYI.exeVirustotal: Detection: 28%
          Source: FYI.exeReversingLabs: Detection: 13%
          Source: C:\Users\user\Desktop\FYI.exeFile read: C:\Users\user\Desktop\FYI.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\FYI.exe 'C:\Users\user\Desktop\FYI.exe'
          Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
          Source: C:\Users\user\Desktop\FYI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\FYI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: FYI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: FYI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: dwmapi.pdb4 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ml.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: clr.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: .ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: bcrypt.pdb& source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdb" source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdbp source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscoree.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: ility.pdbn source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb> source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: ~IC:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: clrjit.pdbD source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdbR source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdbH source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: profapi.pdbv source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: WLDP.pdb\ source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb* source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000004.00000003.354264046.00000000007BF000.00000004.00000001.sdmp
          Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Drawing.pdb`i source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDSD source: WER7630.tmp.dmp.4.dr
          Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: cfgmgr32.pdbz source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Drawing.pdb" source: WerFault.exe, 00000004.00000003.360659515.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wwin32u.pdbN source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: System.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000004.00000003.354082981.00000000007B3000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER7630.tmp.dmp.4.dr
          Source: Binary string: clrjit.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: C:\Users\user\Desktop\FYI.PDB source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: wUxTheme.pdb8 source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: ore.pdb source: WerFault.exe, 00000004.00000003.360647312.0000000004D79000.00000004.00000001.sdmp
          Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.360760457.0000000004D60000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbt source: WER7630.tmp.dmp.4.dr
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.360694227.0000000004D91000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdbl source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000004.00000003.354375862.00000000007C4000.00000004.00000001.sdmp
          Source: Binary string: System.Xml.pdbP source: WER7630.tmp.dmp.4.dr
          Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdbk source: WerFault.exe, 00000004.00000003.360735291.0000000004D64000.00000004.00000040.sdmp
          Source: Binary string: System.Core.pdb source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: j,C:\Windows\System.pdb source: FYI.exe, 00000000.00000002.411046230.00000000006F8000.00000004.00000010.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000004.00000002.406566000.00000000054E0000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000004.00000003.360654287.0000000004D61000.00000004.00000040.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp
          Source: Binary string: System.ni.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp, WER7630.tmp.dmp.4.dr
          Source: Binary string: crypt32.pdb source: WerFault.exe, 00000004.00000003.360739943.0000000004D67000.00000004.00000040.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: FYI.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.FYI.exe.1a0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.FYI.exe.1a0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: initial sampleStatic PE information: section name: .text entropy: 7.25136431131
          Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\FYI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\FYI.exe TID: 7136Thread sleep time: -51794s >= -30000s
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: WerFault.exe, 00000004.00000002.404531746.0000000004867000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
          Source: WerFault.exe, 00000004.00000003.370449184.00000000048D4000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllG
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: FYI.exe, 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: WerFault.exe, 00000004.00000002.404661045.0000000004AB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\FYI.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Users\user\Desktop\FYI.exe VolumeInformation
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\FYI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\FYI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected AgentTeslaShow sources
          Source: Yara matchFile source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: FYI.exe PID: 7132, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing11Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Information Discovery12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          FYI.exe28%VirustotalBrowse
          FYI.exe13%ReversingLabsWin32.Trojan.Generic
          FYI.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFYI.exe, 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 00000004.00000003.358763831.0000000004FE0000.00000004.00000001.sdmpfalse
                                      high

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious

                                      Private

                                      IP
                                      192.168.2.1

                                      General Information

                                      Joe Sandbox Version:31.0.0 Red Diamond
                                      Analysis ID:339364
                                      Start date:13.01.2021
                                      Start time:21:41:53
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 7m 25s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:FYI.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:23
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal76.troj.evad.winEXE@2/4@0/1
                                      EGA Information:Failed
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.88.21.125, 51.104.139.180, 92.122.213.194, 92.122.213.247, 168.61.161.212, 93.184.221.240, 51.103.5.159, 20.54.26.129, 52.155.217.156, 23.210.248.85
                                      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      21:42:52API Interceptor1x Sleep call for process: FYI.exe modified
                                      21:43:18API Interceptor1x Sleep call for process: WerFault.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      No context

                                      Domains

                                      No context

                                      ASN

                                      No context

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_FYI.exe_decd39a630c9d4191a275eb268c8ae351d3d61e4_41043005_12becc4f\Report.wer
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):14450
                                      Entropy (8bit):3.771478576899414
                                      Encrypted:false
                                      SSDEEP:192:nWNnkgHBUZMXqaKeCiynKz/u7sCS274ItM7:WNnLBUZMXqav/u7sCX4ItM7
                                      MD5:19C943447658E2C23D5AE333BA6CC6E9
                                      SHA1:EAFE017FC8DB5497D1026188C9C16D08E242E88F
                                      SHA-256:9082B7E39BF17FC2F26A834C7A2E9898906B4C706ABCDB19967DB7E364FAE8E8
                                      SHA-512:CE7E65A665B350D1AE8B7E0521225EB435EE5CE76B35C8BC8F7B3B5EDAAD29C89B716317545A92C4D57C88A91217D6CB0C1C69503C3BACF50433EC48AFCB22DC
                                      Malicious:true
                                      Reputation:low
                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.5.0.7.6.5.7.6.7.8.1.8.0.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.5.0.7.6.5.8.3.3.2.8.6.4.9.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.0.7.1.5.4.9.9.-.a.1.9.a.-.4.9.e.6.-.b.4.a.1.-.8.6.a.8.b.c.f.2.6.e.9.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.c.9.8.3.9.1.-.a.4.c.8.-.4.4.e.5.-.8.2.2.7.-.b.5.1.4.f.3.4.9.4.a.a.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.Y.I...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.L.E.M.D.E.S.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.d.c.-.0.0.0.1.-.0.0.1.7.-.8.7.0.4.-.8.c.1.6.3.8.e.a.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.a.5.6.1.8.9.0.8.5.5.9.0.7.6.5.f.e.8.8.b.c.a.2.8.e.0.e.8.6.d.8.0.0.0.0.0.0.0.0.!.0.0.0.0.7.8.f.2.e.4.7.f.b.c.d.5.0.d.7.7.b.8.c.0.e.a.5.e.0.7.2.0.9.a.2.b.1.a.7.9.c.4.5.e.
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER7630.tmp.dmp
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 14 streams, Thu Jan 14 05:42:58 2021, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):268581
                                      Entropy (8bit):4.473454946615885
                                      Encrypted:false
                                      SSDEEP:3072:V0A9UCgUrU9gIOgF5YvVm1oiwyMHEEI0lCR1EO0jd+pSabt7:VnTj49RpDYs1j+I0lCR9pS8
                                      MD5:691D98FD805127129A2CAC03D6C32AB4
                                      SHA1:C5C8D660EC5DAFBC973FF31100B10DD141C89834
                                      SHA-256:BDF5DC92ACD40D607BA423EA47B1C2EF54A03F782572E5D0FA0FE025D7C01849
                                      SHA-512:B24108C751D560C5663AEEF4111B083014692A15E8D43ACF30335E11C7C7B6B94D54595128FF0C8DA5E8218B639825EC1E454D15FEE32A56F87D33DF16AE1345
                                      Malicious:false
                                      Reputation:low
                                      Preview: MDMP....... .........._...................U...........B......."......GenuineIntelW...........T.............._.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER8053.tmp.WERInternalMetadata.xml
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8374
                                      Entropy (8bit):3.69482804710006
                                      Encrypted:false
                                      SSDEEP:192:Rrl7r3GLNiQZ6h6YJrSUIFlggmfZfSdCprF89bYRsfc+om:RrlsNi26h6YVSUIFigmfBSnYKfcY
                                      MD5:91110FF09C7FC442779F7EF580769F22
                                      SHA1:57C9D5D4865F64BE2ED5A5E5EA629449D9482287
                                      SHA-256:56ECD21B10ED2EC7F9BDC0358279EBC0222EC5B50ACD51C7ED0FCE0D1837284F
                                      SHA-512:4D69FD3214085D778645788B591FE49B00272AD667B3EA2222FBA895DDFCC3D6F3A1E194A7ECBCCAA9D6A691FC64FEFBAD3744F2251B60303BB02F5AAE712790
                                      Malicious:false
                                      Reputation:low
                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.3.2.<./.P.i.d.>.......
                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER8342.tmp.xml
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4703
                                      Entropy (8bit):4.452410891996699
                                      Encrypted:false
                                      SSDEEP:48:cvIwSD8zsFJgtWI9yMWSC8Bz8fm8M4J0eH2FC+q8vOeHmHwbeOCd:uITfftlSNeJLK2Hiend
                                      MD5:A8539EC6F218065D2C5A263606E75913
                                      SHA1:F1B63F2D4B25EC3C75BA64C5F856F302947D4E33
                                      SHA-256:5CBFED0D236862A5F0BAD8621CCB4BDAD446DB68F61EF6C21837EE21B1735EB6
                                      SHA-512:63825E3006D33D138C1553043B397751F83FFD8456C4B2FF0DA870D8133CE151C0F6093B495D89A858EF7036AB3AB9C3BC8545D8910385B4114700449720CD74
                                      Malicious:false
                                      Reputation:low
                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="815933" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.0302421461740785
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:FYI.exe
                                      File size:930816
                                      MD5:4768fad22f989c9ac940775ca46f91f6
                                      SHA1:78f2e47fbcd50d77b8c0ea5e07209a2b1a79c45e
                                      SHA256:275b79db451178b96e4872f9164b8b89f25a5f22ff8ba5f983d555cb3972a95d
                                      SHA512:74d822b0b1374af9f53b603c145a58482b843aab9fcab43f1c64cc7c4ab6d189998d1964ad2e300d52f124d827175aaea3e3f78a836d07906a703997b5a8ad52
                                      SSDEEP:12288:RK+ympVh1Iw6lLkTYBt12mS0E4h9gwi4z3d87OGMA:aQVUxl6YBtr51iI3d87LMA
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...h.._..............P..J...........i... ........@.. ....................................@................................

                                      File Icon

                                      Icon Hash:000d233320000000

                                      Static PE Info

                                      General

                                      Entrypoint:0x4c691a
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x5FFEC368 [Wed Jan 13 09:54:48 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                      Entrypoint Preview

                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc68c80x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x1e43c.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xc49200xc4a00False0.684223269628data7.25136431131IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xc80000x1e43c0x1e600False0.268614969136data3.13907628015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xe80000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xc82200x468GLS_BINARY_LSB_FIRST
                                      RT_ICON0xc86880x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294901502, next used block 4294901501
                                      RT_ICON0xc97300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294704636, next used block 4294704380
                                      RT_ICON0xcbcd80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294573050, next used block 4294638330
                                      RT_ICON0xcff000x10828data
                                      RT_ICON0xe07280x5797PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                      RT_GROUP_ICON0xe5ec00x5adata
                                      RT_VERSION0xe5f1c0x334data
                                      RT_MANIFEST0xe62500x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                      Imports

                                      DLLImport
                                      mscoree.dll_CorExeMain

                                      Version Infos

                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2011
                                      Assembly Version1.0.0.0
                                      InternalNameELEMDESC.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameFileReplacement
                                      ProductVersion1.0.0.0
                                      FileDescriptionFileReplacement
                                      OriginalFilenameELEMDESC.exe

                                      Network Behavior

                                      Network Port Distribution

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 13, 2021 21:42:56.448657990 CET6426753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:42:56.496658087 CET53642678.8.8.8192.168.2.6
                                      Jan 13, 2021 21:42:58.081685066 CET4944853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:42:58.132519007 CET53494488.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:04.604155064 CET6034253192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:04.655970097 CET53603428.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:10.414232969 CET6134653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:10.462306976 CET53613468.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:17.180489063 CET5177453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:17.238306999 CET53517748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:19.978152037 CET5602353192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:20.026010036 CET53560238.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:23.018889904 CET5838453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:23.066829920 CET53583848.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:25.248848915 CET6026153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:25.296953917 CET53602618.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:26.403151989 CET5606153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:26.451338053 CET53560618.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:27.410645008 CET5833653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:27.461308002 CET53583368.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:28.361809969 CET5378153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:28.410039902 CET53537818.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:29.513449907 CET5406453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:29.564551115 CET53540648.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:30.486542940 CET5281153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:30.537297964 CET53528118.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:30.669805050 CET5529953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:30.717756033 CET53552998.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:31.732527018 CET6374553192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:31.783268929 CET53637458.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:32.202323914 CET5005553192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:32.258920908 CET53500558.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:33.146409988 CET6137453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:33.197583914 CET53613748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:35.430470943 CET5033953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:35.486900091 CET53503398.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:36.609778881 CET6330753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:36.657830000 CET53633078.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:37.779505014 CET4969453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:37.831496954 CET53496948.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:37.985586882 CET5498253192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:38.044173002 CET53549828.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:39.084952116 CET5001053192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:39.132936954 CET53500108.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:40.273437023 CET6371853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:40.325709105 CET53637188.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:41.292197943 CET6211653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:41.340086937 CET53621168.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:46.599957943 CET6381653192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:46.668344975 CET5501453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:46.676014900 CET53638168.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:46.727622986 CET53550148.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:47.335315943 CET6220853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:47.399907112 CET53622088.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:48.047955990 CET5757453192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:48.096183062 CET53575748.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:48.557751894 CET5181853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:48.616976976 CET53518188.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:49.063502073 CET5662853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:49.121870041 CET53566288.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:49.651891947 CET6077853192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:49.710367918 CET53607788.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:50.277299881 CET5379953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:50.339318991 CET53537998.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:51.072112083 CET5468353192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:51.129157066 CET53546838.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:52.179287910 CET5932953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:52.236133099 CET53593298.8.8.8192.168.2.6
                                      Jan 13, 2021 21:43:52.765718937 CET6402153192.168.2.68.8.8.8
                                      Jan 13, 2021 21:43:52.822047949 CET53640218.8.8.8192.168.2.6
                                      Jan 13, 2021 21:44:13.033729076 CET5612953192.168.2.68.8.8.8
                                      Jan 13, 2021 21:44:13.089921951 CET53561298.8.8.8192.168.2.6
                                      Jan 13, 2021 21:44:14.236213923 CET5817753192.168.2.68.8.8.8
                                      Jan 13, 2021 21:44:14.294318914 CET53581778.8.8.8192.168.2.6

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:21:42:47
                                      Start date:13/01/2021
                                      Path:C:\Users\user\Desktop\FYI.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\FYI.exe'
                                      Imagebase:0x1a0000
                                      File size:930816 bytes
                                      MD5 hash:4768FAD22F989C9AC940775CA46F91F6
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.415958937.0000000002661000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.416956383.0000000003669000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:21:42:54
                                      Start date:13/01/2021
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1160
                                      Imagebase:0x9d0000
                                      File size:434592 bytes
                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Disassembly

                                      Code Analysis

                                      Reset < >