Loading ...

Play interactive tourEdit tour

Analysis Report company profile.scr

Overview

General Information

Sample Name:company profile.scr (renamed file extension from scr to exe)
Analysis ID:342227
MD5:02f3eef9da2ef90d0cf59bfaca176886
SHA1:6bca96158d72284a8b5a9e1fe01eb8504a1a05ff
SHA256:76ffd919e86b374004bcbc276cb6e18be4b63287d0ce6f7d9b1b756bfd79d47e
Tags:NanoCoreRATscr

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • company profile.exe (PID: 5960 cmdline: 'C:\Users\user\Desktop\company profile.exe' MD5: 02F3EEF9DA2EF90D0CF59BFACA176886)
    • schtasks.exe (PID: 5976 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • company profile.exe (PID: 6080 cmdline: {path} MD5: 02F3EEF9DA2EF90D0CF59BFACA176886)
      • schtasks.exe (PID: 5864 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp132E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • company profile.exe (PID: 4920 cmdline: 'C:\Users\user\Desktop\company profile.exe' 0 MD5: 02F3EEF9DA2EF90D0CF59BFACA176886)
    • schtasks.exe (PID: 6368 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["105.112.102.172"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000B.00000002.309768585.0000000002DB3000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x144bd:$x1: NanoCore.ClientPluginHost
      • 0x144fa:$x2: IClientNetworkHost
      • 0x1802d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 41 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.company profile.exe.6840000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      6.2.company profile.exe.6840000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      6.2.company profile.exe.6840000.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        25.2.company profile.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        25.2.company profile.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xff05:$x1: NanoCore Client.exe
        • 0x1018d:$x2: NanoCore.ClientPluginHost
        • 0x117c6:$s1: PluginCommand
        • 0x117ba:$s2: FileCommand
        • 0x1266b:$s3: PipeExists
        • 0x18422:$s4: PipeCreated
        • 0x101b7:$s5: IClientLoggingHost
        Click to see the 11 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\company profile.exe, ProcessId: 6080, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\company profile.exe' , ParentImage: C:\Users\user\Desktop\company profile.exe, ParentProcessId: 5960, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp', ProcessId: 5976

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: company profile.exe.6080.6.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["105.112.102.172"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\UnShSbgF.exeVirustotal: Detection: 33%Perma Link
        Source: C:\Users\user\AppData\Roaming\UnShSbgF.exeReversingLabs: Detection: 37%
        Multi AV Scanner detection for submitted fileShow sources
        Source: company profile.exeVirustotal: Detection: 33%Perma Link
        Source: company profile.exeReversingLabs: Detection: 37%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 4920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6456, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6080, type: MEMORY
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\UnShSbgF.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: company profile.exeJoe Sandbox ML: detected
        Source: 25.2.company profile.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.company profile.exe.6840000.5.unpackAvira: Label: TR/NanoCore.fadte
        Source: 6.2.company profile.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: company profile.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: company profile.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_03341670
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h1_2_0334FD48
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then push dword ptr [ebp-20h]1_2_0334FEB8
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh1_2_0334FEB8
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_03341590
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_033415D1
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]1_2_059CD750
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]1_2_059CD748
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then xor edx, edx1_2_059CFF56
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then xor edx, edx1_2_059CFF60
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]11_2_052FD74B
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]11_2_052FD750
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then xor edx, edx11_2_052FFF60
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4x nop then xor edx, edx11_2_052FFF57

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 105.112.102.172
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: kcfresh.duckdns.org
        Source: unknownDNS query: name: kcfresh.ddns.net
        Source: global trafficTCP traffic: 192.168.2.3:49713 -> 185.140.53.227:5050
        Source: global trafficTCP traffic: 192.168.2.3:49721 -> 105.112.102.172:5050
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: Joe Sandbox ViewASN Name: VNL1-ASNG VNL1-ASNG
        Source: unknownDNS traffic detected: queries for: kcfresh.duckdns.org
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: company profile.exe, 00000001.00000002.252392608.0000000003407000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.309406249.0000000002D27000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: company profile.exe, 0000000B.00000003.280780605.00000000035D3000.00000004.00000001.sdmpString found in binary or memory: http://tempuri.org/experimentDataSet.xsd
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: company profile.exe, 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 4920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6456, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6080, type: MEMORY
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.596680972.0000000005BD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: company profile.exe PID: 4920, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: company profile.exe PID: 4920, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: company profile.exe PID: 5960, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: company profile.exe PID: 5960, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: company profile.exe PID: 6456, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: company profile.exe PID: 6456, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: company profile.exe PID: 6080, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: company profile.exe PID: 6080, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.company profile.exe.5bd0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        PE file contains section with special charsShow sources
        Source: company profile.exeStatic PE information: section name: EMP;sb
        Source: UnShSbgF.exe.1.drStatic PE information: section name: EMP;sb
        PE file has nameless sectionsShow sources
        Source: company profile.exeStatic PE information: section name:
        Source: UnShSbgF.exe.1.drStatic PE information: section name:
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03342B481_2_03342B48
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03346B4A1_2_03346B4A
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334BA201_2_0334BA20
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033405121_2_03340512
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334355A1_2_0334355A
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03344DA81_2_03344DA8
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033424101_2_03342410
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334B4D01_2_0334B4D0
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033423791_2_03342379
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03342FF81_2_03342FF8
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03345E201_2_03345E20
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03345E101_2_03345E10
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033452E01_2_033452E0
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033466E01_2_033466E0
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033452D01_2_033452D0
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033466D11_2_033466D1
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033469321_2_03346932
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033469401_2_03346940
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033415901_2_03341590
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033455821_2_03345582
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033475F41_2_033475F4
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033415D11_2_033415D1
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334AC101_2_0334AC10
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03346C061_2_03346C06
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334500A1_2_0334500A
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033464A81_2_033464A8
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033418911_2_03341891
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033464981_2_03346498
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_0334609A1_2_0334609A
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033448D21_2_033448D2
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059CC72C1_2_059CC72C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059CCC981_2_059CCC98
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059CAC701_2_059CAC70
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059CAC6B1_2_059CAC6B
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059C98381_2_059C9838
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F016C4_2_003F016C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F09494_2_003F0949
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F09B74_2_003F09B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003ECA094_2_003ECA09
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003ECA754_2_003ECA75
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F03B74_2_003F03B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D016C5_2_002D016C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D09495_2_002D0949
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D09B75_2_002D09B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002CCA095_2_002CCA09
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002CCA755_2_002CCA75
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D03B75_2_002D03B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB09B76_2_00EB09B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB016C6_2_00EB016C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB09496_2_00EB0949
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EACA756_2_00EACA75
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EACA096_2_00EACA09
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB03B76_2_00EB03B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_031AE4716_2_031AE471
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_031AE4806_2_031AE480
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_031ABBD46_2_031ABBD4
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_06C200406_2_06C20040
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052FC72C11_2_052FC72C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052FAC6B11_2_052FAC6B
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052FAC7011_2_052FAC70
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052FCCA311_2_052FCCA3
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F983811_2_052F9838
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B094922_2_004B0949
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B016C22_2_004B016C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B09B722_2_004B09B7
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004ACA7522_2_004ACA75
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004ACA0922_2_004ACA09
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B03B722_2_004B03B7
        Source: company profile.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: UnShSbgF.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 00000001.00000002.257978885.00000000063B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs company profile.exe
        Source: company profile.exe, 00000001.00000002.257978885.00000000063B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs company profile.exe
        Source: company profile.exe, 00000001.00000002.257548044.00000000062B0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs company profile.exe
        Source: company profile.exe, 00000001.00000002.252435267.000000000341D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs company profile.exe
        Source: company profile.exe, 00000001.00000000.214189125.0000000000FB8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 00000001.00000003.247183418.0000000003952000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTypeLibImporterFlags.dll4 vs company profile.exe
        Source: company profile.exe, 00000001.00000002.262266350.000000000D7C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 00000004.00000000.245747138.00000000003E8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 00000005.00000000.247912364.00000000002C8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 00000006.00000002.587386894.0000000000EA8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs company profile.exe
        Source: company profile.exe, 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs company profile.exe
        Source: company profile.exe, 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs company profile.exe
        Source: company profile.exe, 00000006.00000002.588949042.00000000015DA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs company profile.exe
        Source: company profile.exe, 00000006.00000002.596906937.0000000006750000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs company profile.exe
        Source: company profile.exe, 00000006.00000002.596330468.00000000057F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs company profile.exe
        Source: company profile.exe, 00000006.00000002.597580362.0000000007230000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.312572551.00000000031EE000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTypeLibImporterFlags.dll4 vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.308481106.000000000107A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.309768585.0000000002DB3000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs company profile.exe
        Source: company profile.exe, 0000000B.00000000.261152804.0000000000948000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.315557540.0000000005CB0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.315557540.0000000005CB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.318131650.000000000CB20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs company profile.exe
        Source: company profile.exe, 0000000B.00000002.314637005.0000000005BB0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename vs company profile.exe
        Source: company profile.exe, 00000016.00000002.302743728.00000000004A8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 00000017.00000002.304090131.00000000004C8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 00000018.00000002.305392852.00000000001E8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exe, 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs company profile.exe
        Source: company profile.exe, 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs company profile.exe
        Source: company profile.exe, 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs company profile.exe
        Source: company profile.exe, 00000019.00000002.327797268.0000000000668000.00000002.00020000.sdmpBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exeBinary or memory string: OriginalFilename8v.exe. vs company profile.exe
        Source: company profile.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.596680972.0000000005BD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.596680972.0000000005BD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: company profile.exe PID: 4920, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: company profile.exe PID: 4920, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: company profile.exe PID: 5960, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: company profile.exe PID: 5960, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: company profile.exe PID: 6456, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: company profile.exe PID: 6456, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: company profile.exe PID: 6080, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: company profile.exe PID: 6080, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.company profile.exe.5bd0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.company profile.exe.5bd0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: company profile.exeStatic PE information: Section: EMP;sb ZLIB complexity 1.00031569693
        Source: UnShSbgF.exe.1.drStatic PE information: Section: EMP;sb ZLIB complexity 1.00031569693
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@25/7@16/3
        Source: C:\Users\user\Desktop\company profile.exeFile created: C:\Users\user\AppData\Roaming\UnShSbgF.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5636:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2212:120:WilError_01
        Source: C:\Users\user\Desktop\company profile.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{0af7db9b-e643-4242-8d33-72a12cf49afa}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6376:120:WilError_01
        Source: C:\Users\user\Desktop\company profile.exeFile created: C:\Users\user\AppData\Local\Temp\tmp75B1.tmpJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: company profile.exe, 00000001.00000003.236561919.0000000003CB3000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000003.280780605.00000000035D3000.00000004.00000001.sdmpBinary or memory string: select * from PMS;select * from PMS where
        Source: company profile.exeVirustotal: Detection: 33%
        Source: company profile.exeReversingLabs: Detection: 37%
        Source: C:\Users\user\Desktop\company profile.exeFile read: C:\Users\user\Desktop\company profile.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe 'C:\Users\user\Desktop\company profile.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp132E.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe 'C:\Users\user\Desktop\company profile.exe' 0
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: unknownProcess created: C:\Users\user\Desktop\company profile.exe {path}
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp132E.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: company profile.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: company profile.exeStatic file information: File size 1499648 > 1048576
        Source: company profile.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        Detected unpacking (changes PE section rights)Show sources
        Source: C:\Users\user\Desktop\company profile.exeUnpacked PE file: 1.2.company profile.exe.ec0000.0.unpack EMP;:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
        Source: C:\Users\user\Desktop\company profile.exeUnpacked PE file: 11.2.company profile.exe.850000.0.unpack EMP;:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
        .NET source code contains potential unpackerShow sources
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: company profile.exeStatic PE information: section name: EMP;sb
        Source: company profile.exeStatic PE information: section name:
        Source: UnShSbgF.exe.1.drStatic PE information: section name: EMP;sb
        Source: UnShSbgF.exe.1.drStatic PE information: section name:
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_00F1A58E push edx; retf 1_2_00F1A5AC
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_00F1BC3D push cs; retf 1_2_00F1BC40
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_00F1A612 push edx; retf 1_2_00F1A5AC
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_033437C3 push edx; retf 1_2_033437C5
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_059C800B push 5D5F5E59h; ret 1_2_059C8003
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F402E push esi; retn 0003h4_2_003F4077
        Source: C:\Users\user\Desktop\company profile.exeCode function: 4_2_003F374E push es; retf 4_2_003F375C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D402E push esi; retn 0003h5_2_002D4077
        Source: C:\Users\user\Desktop\company profile.exeCode function: 5_2_002D374E push es; retf 5_2_002D375C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB402E push esi; retn 0003h6_2_00EB4077
        Source: C:\Users\user\Desktop\company profile.exeCode function: 6_2_00EB374E push es; retf 6_2_00EB375C
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_008AA58E push edx; retf 11_2_008AA5AC
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_008AA612 push edx; retf 11_2_008AA5AC
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_008ABC3D push cs; retf 11_2_008ABC40
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F0580 push edi; retf 11_2_052F0586
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F043B push esp; retf 11_2_052F0442
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F0439 push esp; retf 11_2_052F043A
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052FF138 push esp; retf 11_2_052FF139
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F6FE3 pushfd ; retf 11_2_052F6FEA
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F6FDF pushfd ; retf 11_2_052F6FE2
        Source: C:\Users\user\Desktop\company profile.exeCode function: 11_2_052F1E2B pushad ; retf 11_2_052F1E32
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B402E push esi; retn 0003h22_2_004B4077
        Source: C:\Users\user\Desktop\company profile.exeCode function: 22_2_004B374E push es; retf 22_2_004B375C
        Source: initial sampleStatic PE information: section name: EMP;sb entropy: 7.99980466465
        Source: initial sampleStatic PE information: section name: EMP;sb entropy: 7.99980466465
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.company profile.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 25.2.company profile.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\company profile.exeFile created: C:\Users\user\AppData\Roaming\UnShSbgF.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\company profile.exeFile opened: C:\Users\user\Desktop\company profile.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 0000000B.00000002.309768585.0000000002DB3000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.252435267.000000000341D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 4920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 5960, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: company profile.exe, 00000001.00000002.252435267.000000000341D000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: company profile.exe, 00000001.00000002.252435267.000000000341D000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\company profile.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeWindow / User API: threadDelayed 4701Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeWindow / User API: threadDelayed 4744Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeWindow / User API: foregroundWindowGot 1245Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeWindow / User API: foregroundWindowGot 413Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 2396Thread sleep time: -31500s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 6140Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 5328Thread sleep time: -7378697629483816s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 5856Thread sleep time: -31500s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 5260Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\company profile.exe TID: 6488Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: company profile.exe, 00000006.00000002.597580362.0000000007230000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: company profile.exe, 00000006.00000002.597580362.0000000007230000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: company profile.exe, 00000006.00000002.597580362.0000000007230000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: company profile.exe, 0000000B.00000002.311986136.0000000002FE2000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
        Source: company profile.exe, 00000006.00000002.589235943.000000000167D000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: company profile.exe, 00000006.00000002.597580362.0000000007230000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\company profile.exeProcess information queried: ProcessInformationJump to behavior

        Anti Debugging:

        barindex
        Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
        Source: C:\Users\user\Desktop\company profile.exeCode function: 1_2_03341670 CheckRemoteDebuggerPresent,1_2_03341670
        Source: C:\Users\user\Desktop\company profile.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp132E.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\company profile.exeProcess created: C:\Users\user\Desktop\company profile.exe {path}Jump to behavior
        Source: company profile.exe, 00000006.00000002.597562460.00000000071ED000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: company profile.exe, 00000006.00000002.589576694.0000000001BE0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: company profile.exe, 00000006.00000002.589576694.0000000001BE0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: company profile.exe, 00000006.00000002.591492562.000000000330E000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa&l
        Source: company profile.exe, 00000006.00000002.589576694.0000000001BE0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Users\user\Desktop\company profile.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Users\user\Desktop\company profile.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Users\user\Desktop\company profile.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Users\user\Desktop\company profile.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\company profile.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 4920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6456, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6080, type: MEMORY
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: company profile.exe, 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: company profile.exe, 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: company profile.exe, 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: company profile.exe, 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: company profile.exe, 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: company profile.exe, 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 4920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 5960, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6456, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: company profile.exe PID: 6080, type: MEMORY
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 25.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.6840000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.company profile.exe.400000.0.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading1Input Capture11Security Software Discovery321Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion4LSASS MemoryVirtualization/Sandbox Evasion4Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing23Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 342227 Sample: company profile.scr Startdate: 20/01/2021 Architecture: WINDOWS Score: 100 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 17 other signatures 2->60 8 company profile.exe 6 2->8         started        11 company profile.exe 4 2->11         started        process3 file4 40 C:\Users\user\AppData\Roaming\UnShSbgF.exe, PE32 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp75B1.tmp, XML 8->42 dropped 44 C:\Users\user\...\company profile.exe.log, ASCII 8->44 dropped 13 company profile.exe 8 8->13         started        18 schtasks.exe 1 8->18         started        20 company profile.exe 8->20         started        22 company profile.exe 8->22         started        24 schtasks.exe 1 11->24         started        26 company profile.exe 2 11->26         started        28 company profile.exe 11->28         started        30 2 other processes 11->30 process5 dnsIp6 48 kcfresh.ddns.net 105.112.102.172, 5050 VNL1-ASNG Nigeria 13->48 50 kcfresh.duckdns.org 185.140.53.227, 49713, 49717, 49718 DAVID_CRAIGGG Sweden 13->50 52 192.168.2.1 unknown unknown 13->52 46 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 13->46 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->62 32 schtasks.exe 1 13->32         started        34 conhost.exe 18->34         started        36 conhost.exe 24->36         started        file7 signatures8 process9 process10 38 conhost.exe 32->38         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        company profile.exe34%VirustotalBrowse
        company profile.exe38%ReversingLabsWin32.Trojan.Wacatac
        company profile.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\UnShSbgF.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\UnShSbgF.exe34%VirustotalBrowse
        C:\Users\user\AppData\Roaming\UnShSbgF.exe38%ReversingLabsWin32.Trojan.Wacatac

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        11.2.company profile.exe.850000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
        25.2.company profile.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.company profile.exe.6840000.5.unpack100%AviraTR/NanoCore.fadteDownload File
        6.2.company profile.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.company profile.exe.ec0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

        Domains

        SourceDetectionScannerLabelLink
        kcfresh.duckdns.org1%VirustotalBrowse
        kcfresh.ddns.net3%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        kcfresh.duckdns.org
        185.140.53.227
        truetrueunknown
        kcfresh.ddns.net
        105.112.102.172
        truetrueunknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.apache.org/licenses/LICENSE-2.0company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.comcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designers/?company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bThecompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                  high
                  http://www.tiro.comcompany profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designerscompany profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                    high
                    http://www.goodfont.co.krcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cThecompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cncompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmlcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasecompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8company profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                          high
                          http://www.fonts.comcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.krcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleasecompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cncompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecompany profile.exe, 00000001.00000002.252392608.0000000003407000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.309406249.0000000002D27000.00000004.00000001.sdmpfalse
                              high
                              http://www.sakkal.comcompany profile.exe, 00000001.00000002.261375523.000000000CE02000.00000004.00000001.sdmp, company profile.exe, 0000000B.00000002.317231994.000000000B520000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              185.140.53.227
                              unknownSweden
                              209623DAVID_CRAIGGGtrue
                              105.112.102.172
                              unknownNigeria
                              36873VNL1-ASNGtrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:342227
                              Start date:20.01.2021
                              Start time:17:09:39
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 13m 24s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:company profile.scr (renamed file extension from scr to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:40
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@25/7@16/3
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 2.1% (good quality ratio 1.1%)
                              • Quality average: 30.7%
                              • Quality standard deviation: 34.6%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 64
                              • Number of non-executed functions: 27
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                              • Excluded IPs from analysis (whitelisted): 168.61.161.212, 13.88.21.125, 104.42.151.234, 23.210.248.85, 51.104.144.132, 8.248.147.254, 8.248.115.254, 8.253.204.121, 67.27.157.126, 67.27.159.126, 20.54.26.129, 92.122.213.194, 92.122.213.247, 51.104.139.180, 52.155.217.156
                              • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, arc.msn.com.nsatc.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              17:12:42API Interceptor1305x Sleep call for process: company profile.exe modified
                              17:12:54Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\company profile.exe" s>$(Arg0)

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              185.140.53.227New Order.exeGet hashmaliciousBrowse

                                Domains

                                No context

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                DAVID_CRAIGGGNEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
                                • 185.140.53.253
                                richiealvin.exeGet hashmaliciousBrowse
                                • 91.193.75.185
                                Quotation.exeGet hashmaliciousBrowse
                                • 185.140.53.154
                                DHL Delivery Shipping Cargo. Pdf.exeGet hashmaliciousBrowse
                                • 185.244.30.18
                                CompanyLicense.exeGet hashmaliciousBrowse
                                • 185.140.53.253
                                Purchase Order 2094742424.exeGet hashmaliciousBrowse
                                • 185.244.30.132
                                PURCHASE OREDER. PRINT. pdf.exeGet hashmaliciousBrowse
                                • 91.193.75.45
                                PO.exeGet hashmaliciousBrowse
                                • 185.140.53.234
                                SWIFT.exeGet hashmaliciousBrowse
                                • 185.140.53.154
                                SecuriteInfo.com.BScope.Trojan-Dropper.Injector.exeGet hashmaliciousBrowse
                                • 185.140.53.234
                                PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                • 185.140.53.131
                                Orden n.#U00ba STL21119, pdf.exeGet hashmaliciousBrowse
                                • 185.140.53.129
                                Proof of Payment.exeGet hashmaliciousBrowse
                                • 185.244.30.51
                                DxCHoDnNLn.exeGet hashmaliciousBrowse
                                • 185.140.53.202
                                T7gzTHDZ7g.rtfGet hashmaliciousBrowse
                                • 185.140.53.202
                                PO - 2021-000511.exeGet hashmaliciousBrowse
                                • 185.244.30.69
                                PO AR483-1590436 _ J-3000 PROJT.xlsxGet hashmaliciousBrowse
                                • 185.140.53.202
                                Qotation.exeGet hashmaliciousBrowse
                                • 185.140.53.154
                                PO - 2021-000511.exeGet hashmaliciousBrowse
                                • 185.244.30.69
                                file.exeGet hashmaliciousBrowse
                                • 91.193.75.155
                                VNL1-ASNGOrder_List_PO# 081929.exeGet hashmaliciousBrowse
                                • 105.112.102.160
                                Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                • 105.112.102.162
                                Doc#6620200947535257653.exeGet hashmaliciousBrowse
                                • 105.112.106.128
                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                • 105.112.113.90
                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                • 105.112.113.90
                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                • 105.112.113.90
                                DHL_file 187652345643476245.exeGet hashmaliciousBrowse
                                • 105.112.113.90
                                Confirmation Copy RefNo-MT102.exeGet hashmaliciousBrowse
                                • 105.112.102.57
                                FedExs AWB#5305323204643.exeGet hashmaliciousBrowse
                                • 105.112.113.90
                                PAYMENT COPY.exeGet hashmaliciousBrowse
                                • 105.112.109.37
                                PO456789.exeGet hashmaliciousBrowse
                                • 105.112.96.12
                                DHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
                                • 105.112.101.201
                                ibgcrnNmhB.exeGet hashmaliciousBrowse
                                • 105.112.25.130
                                purchase order.exeGet hashmaliciousBrowse
                                • 105.112.25.74
                                packing list.xlsx.exeGet hashmaliciousBrowse
                                • 105.112.69.142
                                9087654.exeGet hashmaliciousBrowse
                                • 105.112.101.151
                                RFQ.exeGet hashmaliciousBrowse
                                • 105.112.100.239
                                LOI.exeGet hashmaliciousBrowse
                                • 105.112.100.239
                                corporate-tax.exeGet hashmaliciousBrowse
                                • 105.112.101.84
                                QUOTATION - COVID 19 PROTECTION SOLUTIONS - final.exeGet hashmaliciousBrowse
                                • 105.112.124.8

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\company profile.exe.log
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:ML9E4Ks29E4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MxHKX9HKx1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:B666A4404B132B2BF6C04FBF848EB948
                                SHA1:D2EFB3D43F8B8806544D3A47F7DAEE8534981739
                                SHA-256:7870616D981C8C0DE9A54E7383CD035470DB20CBF75ACDF729C32889D4B6ED96
                                SHA-512:00E955EE9F14CEAE07E571A8EF2E103200CF421BAE83A66ED9F9E1AA6A9F449B653EDF1BFDB662A364D58ECF9B5FE4BB69D590DB2653F2F46A09F4D47719A862
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                C:\Users\user\AppData\Local\Temp\tmp132E.tmp
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1305
                                Entropy (8bit):5.095160776157076
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK00lxtn:cbk4oL600QydbQxIYODOLedq37j
                                MD5:4F99D40B064D2DF7C7D4C116C77F3D4A
                                SHA1:7A3169F99997B406FEA127C0B9A7E8D6ACE00CA1
                                SHA-256:13EA833AE6E2760DE9D70F0B3AB442CCA6DF2240206120DAE783F66147778B30
                                SHA-512:E7064B43AF7C38D18CAF462524D2A8A2DC3CF93DD4CBE5495AD5762D81365EE26C4CB54AAAA387A6C25D3151F264183926AF46C9684CC07F039AF780F571488B
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                C:\Users\user\AppData\Local\Temp\tmp75B1.tmp
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1641
                                Entropy (8bit):5.186538159731165
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBEItn:cbh47TlNQ//rydbz9I3YODOLNdq3j
                                MD5:5D4EB8C36D9B89226BDC5ADB52FDDFC0
                                SHA1:AF597C7A4A7C686AFFAF2482DB75417D5F92315D
                                SHA-256:93466395E1FD944F5ED9AFD1063E0B46CE6CA6F8CF5CE0E89BD2CE049862175F
                                SHA-512:7C7B7AFD07D5444A373CE4113F200C1BBCA840399D473EC144562B51174D404B1442A660E63CA47BA6C83492BC676839852C80157F2503B2FAD9A1C92B81D95A
                                Malicious:true
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1641
                                Entropy (8bit):5.186538159731165
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBEItn:cbh47TlNQ//rydbz9I3YODOLNdq3j
                                MD5:5D4EB8C36D9B89226BDC5ADB52FDDFC0
                                SHA1:AF597C7A4A7C686AFFAF2482DB75417D5F92315D
                                SHA-256:93466395E1FD944F5ED9AFD1063E0B46CE6CA6F8CF5CE0E89BD2CE049862175F
                                SHA-512:7C7B7AFD07D5444A373CE4113F200C1BBCA840399D473EC144562B51174D404B1442A660E63CA47BA6C83492BC676839852C80157F2503B2FAD9A1C92B81D95A
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:ISO-8859 text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:reCYP:KCYP
                                MD5:8B9C7557FD06FFDB6AB44F46DC5604D4
                                SHA1:D1E1B759695E4473A8241ED6FD686B085DE6AC9B
                                SHA-256:B7BB0299B1B8D42CABBA97A91C9AB732DEBDE40B8D5CA84904C938AB443F3ABC
                                SHA-512:A9BDE3F3F6DE9608AE9FA5BC4422BB4735BC6540482DC8D74DD87DCB2F400D52BBCDE5F685A11D21758CCDC0266C08C4F6CECCCF7CE96D570A4E81DA6BC4C2E3
                                Malicious:true
                                Preview: d.{....H
                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):42
                                Entropy (8bit):4.424955744609936
                                Encrypted:false
                                SSDEEP:3:oNWXp5vGKIVE4XoJ:oNWXpFGTiJ
                                MD5:97913E49D175BDD85E9DF3F71519605F
                                SHA1:B6D8C0E8D4888A71AE16529A5332A745D2F6E6FB
                                SHA-256:C46B23847096F56A5952D29B05027728B48DB4B1B98A804CBEF9B88659CD5D2B
                                SHA-512:77916F0BF82170A6398C251FF77A578741039D9D03915EE83BA374F6E0FD09BF550AAAE0B91277FBF21F5B91709AF5D987C0D566960488E93E2A64E46AAA5833
                                Malicious:false
                                Preview: C:\Users\user\Desktop\company profile.exe
                                C:\Users\user\AppData\Roaming\UnShSbgF.exe
                                Process:C:\Users\user\Desktop\company profile.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1499648
                                Entropy (8bit):7.424594248821242
                                Encrypted:false
                                SSDEEP:24576:Wb8xxR5pV+4Xd8LO6TVz7uxgHf8JnHkDasy:E8f7jWdTVei/OHkDq
                                MD5:02F3EEF9DA2EF90D0CF59BFACA176886
                                SHA1:6BCA96158D72284A8B5A9E1FE01EB8504A1A05FF
                                SHA-256:76FFD919E86B374004BCBC276CB6E18BE4B63287D0CE6F7D9B1B756BFD79D47E
                                SHA-512:CE64211FA30C6C1F8541D8889E0E373A829ABD4E786B1EF6B473E851E9E7CF7C5109D0B2F85936494D4D3125CF63FFC6A282C75E1A34CDCF052111753AC35747
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Virustotal, Detection: 34%, Browse
                                • Antivirus: ReversingLabs, Detection: 38%
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0..............@....... ....@.. .......................`............@.....................................K....`....................... .......................................................@..................H...........EMP;.s.bPD... ...F..................@....text................J.............. ..`.rsrc........`.......&..............@..@.reloc....... ......................@..B.............@...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.424594248821242
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                • Win32 Executable (generic) a (10002005/4) 49.96%
                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:company profile.exe
                                File size:1499648
                                MD5:02f3eef9da2ef90d0cf59bfaca176886
                                SHA1:6bca96158d72284a8b5a9e1fe01eb8504a1a05ff
                                SHA256:76ffd919e86b374004bcbc276cb6e18be4b63287d0ce6f7d9b1b756bfd79d47e
                                SHA512:ce64211fa30c6c1f8541d8889e0e373a829abd4e786b1ef6b473e851e9e7cf7c5109d0b2f85936494d4d3125cf63ffc6a282c75e1a34cdcf052111753ac35747
                                SSDEEP:24576:Wb8xxR5pV+4Xd8LO6TVz7uxgHf8JnHkDasy:E8f7jWdTVei/OHkDq
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0..............@....... ....@.. .......................`............@................................

                                File Icon

                                Icon Hash:926cd8b0b4d24f92

                                Static PE Info

                                General

                                Entrypoint:0x57400a
                                Entrypoint Section:
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x6007DFD9 [Wed Jan 20 07:46:33 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00574000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xf88900x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1560000x1b788.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1720000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x1740000x8
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0xf80000x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                EMP;sb0x20000xf44500xf4600False1.00031569693data7.99980466465IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .text0xf80000x5dae80x5dc00False0.2996171875data4.37913403496IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0x1560000x1b7880x1b800False0.186780894886data3.43599224394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1720000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                0x1740000x100x200False0.044921875data0.142635768149IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x1562200x468GLS_BINARY_LSB_FIRST
                                RT_ICON0x1566880x2ad0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                RT_ICON0x1591580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 3892081920, next used block 3187504384
                                RT_ICON0x15b7000x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294866176, next used block 4294866176
                                RT_ICON0x15c7a80x10828dBase III DBT, version number 0, next free block index 40
                                RT_ICON0x16cfd00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 670987520, next used block 0
                                RT_GROUP_ICON0x1711f80x5adata
                                RT_VERSION0x1712540x342data
                                RT_MANIFEST0x1715980x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright Hewlett-Packard 2016
                                Assembly Version46.3.0.0
                                InternalName8v.exe
                                FileVersion46.3.0.0
                                CompanyNameHewlett-Packard
                                LegalTrademarks
                                Comments
                                ProductName
                                ProductVersion46.3.0.0
                                FileDescription
                                OriginalFilename8v.exe

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Jan 20, 2021 17:12:53.951412916 CET497135050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:12:54.000073910 CET505049713185.140.53.227192.168.2.3
                                Jan 20, 2021 17:12:54.504492998 CET497135050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:12:54.553361893 CET505049713185.140.53.227192.168.2.3
                                Jan 20, 2021 17:12:55.064599037 CET497135050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:12:55.113152027 CET505049713185.140.53.227192.168.2.3
                                Jan 20, 2021 17:12:59.254609108 CET497175050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:12:59.303097963 CET505049717185.140.53.227192.168.2.3
                                Jan 20, 2021 17:12:59.830631971 CET497175050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:12:59.879139900 CET505049717185.140.53.227192.168.2.3
                                Jan 20, 2021 17:13:00.493585110 CET497175050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:13:00.542746067 CET505049717185.140.53.227192.168.2.3
                                Jan 20, 2021 17:13:04.674650908 CET497185050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:13:04.723083019 CET505049718185.140.53.227192.168.2.3
                                Jan 20, 2021 17:13:05.331134081 CET497185050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:13:05.379919052 CET505049718185.140.53.227192.168.2.3
                                Jan 20, 2021 17:13:06.034282923 CET497185050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:13:06.083101034 CET505049718185.140.53.227192.168.2.3
                                Jan 20, 2021 17:13:10.632256985 CET497215050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:13.659883976 CET497215050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:19.676093102 CET497215050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:27.459836960 CET497255050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:30.473774910 CET497255050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:36.489917994 CET497255050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:44.849807978 CET497335050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:47.850276947 CET497335050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:13:53.850784063 CET497335050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:01.686594963 CET497425050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:01.735313892 CET505049742185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:02.242161989 CET497425050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:02.291104078 CET505049742185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:02.804785967 CET497425050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:02.853647947 CET505049742185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:06.974219084 CET497435050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:07.023099899 CET505049743185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:07.523895979 CET497435050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:07.572540045 CET505049743185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:08.086697102 CET497435050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:08.135360956 CET505049743185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:12.538840055 CET497445050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:12.587572098 CET505049744185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:13.102432966 CET497445050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:13.151457071 CET505049744185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:13.665100098 CET497445050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:14:13.713771105 CET505049744185.140.53.227192.168.2.3
                                Jan 20, 2021 17:14:17.888115883 CET497455050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:20.884325981 CET497455050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:26.900515079 CET497455050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:34.720561028 CET497485050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:37.729413986 CET497485050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:43.729974031 CET497485050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:51.353595972 CET497495050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:14:54.355807066 CET497495050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:15:00.356338024 CET497495050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:15:08.322185040 CET497505050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:08.370486021 CET505049750185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:08.872690916 CET497505050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:08.921380043 CET505049750185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:09.435206890 CET497505050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:09.483859062 CET505049750185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:13.769426107 CET497515050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:13.818001032 CET505049751185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:14.326442003 CET497515050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:14.374986887 CET505049751185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:14.893300056 CET497515050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:14.942029953 CET505049751185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:19.113058090 CET497575050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:19.161782980 CET505049757185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:19.686198950 CET497575050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:19.734893084 CET505049757185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:20.288041115 CET497575050192.168.2.3185.140.53.227
                                Jan 20, 2021 17:15:20.336539984 CET505049757185.140.53.227192.168.2.3
                                Jan 20, 2021 17:15:24.561131954 CET497635050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:15:27.711155891 CET497635050192.168.2.3105.112.102.172
                                Jan 20, 2021 17:15:33.727176905 CET497635050192.168.2.3105.112.102.172

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Jan 20, 2021 17:12:30.115456104 CET6015253192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:30.171864986 CET53601528.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:31.108071089 CET5754453192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:31.164551973 CET53575448.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:33.920929909 CET5598453192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:33.971705914 CET53559848.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:36.327366114 CET6418553192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:36.375221014 CET53641858.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:37.282816887 CET6511053192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:37.330900908 CET53651108.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:47.214193106 CET5836153192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:47.262096882 CET53583618.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:48.410496950 CET6349253192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:48.461219072 CET53634928.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:50.876347065 CET6083153192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:50.926973104 CET53608318.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:52.303313971 CET6010053192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:52.362260103 CET53601008.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:53.715147018 CET5319553192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:53.936311007 CET53531958.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:57.024483919 CET5014153192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:57.085048914 CET53501418.8.8.8192.168.2.3
                                Jan 20, 2021 17:12:59.203219891 CET5302353192.168.2.38.8.8.8
                                Jan 20, 2021 17:12:59.251117945 CET53530238.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:04.612528086 CET4956353192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:04.668864012 CET53495638.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:06.832524061 CET5135253192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:06.880430937 CET53513528.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:10.573229074 CET5934953192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:10.630872011 CET53593498.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:15.194449902 CET5708453192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:16.192384958 CET5708453192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:16.240313053 CET53570848.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:24.219270945 CET5882353192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:24.267188072 CET53588238.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:26.721561909 CET5756853192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:26.769531012 CET53575688.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:27.398511887 CET5054053192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:27.457781076 CET53505408.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:27.945595026 CET5436653192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:27.993823051 CET53543668.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:30.246763945 CET5303453192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:30.294702053 CET53530348.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:31.382765055 CET5776253192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:31.430870056 CET53577628.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:32.011482954 CET5543553192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:32.082386971 CET53554358.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:32.660548925 CET5071353192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:32.711457014 CET53507138.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:35.258546114 CET5613253192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:35.309422970 CET53561328.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:36.446857929 CET5898753192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:36.494741917 CET53589878.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:44.700119019 CET5657953192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:44.757843018 CET53565798.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:45.841614962 CET6063353192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:45.889656067 CET53606338.8.8.8192.168.2.3
                                Jan 20, 2021 17:13:51.571892023 CET6129253192.168.2.38.8.8.8
                                Jan 20, 2021 17:13:51.629636049 CET53612928.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:01.463038921 CET6361953192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:01.684941053 CET53636198.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:06.915060997 CET6493853192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:06.971584082 CET53649388.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:12.313934088 CET6194653192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:12.535736084 CET53619468.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:17.765189886 CET6491053192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:17.825486898 CET53649108.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:21.005423069 CET5212353192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:21.056504965 CET53521238.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:23.060621977 CET5613053192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:23.119894981 CET53561308.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:34.662410975 CET5633853192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:34.718652010 CET53563388.8.8.8192.168.2.3
                                Jan 20, 2021 17:14:51.294055939 CET5942053192.168.2.38.8.8.8
                                Jan 20, 2021 17:14:51.350522041 CET53594208.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:07.953716993 CET5878453192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:08.320425987 CET53587848.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:13.571491957 CET6397853192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:13.628048897 CET53639788.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:16.234194040 CET6293853192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:16.310164928 CET53629388.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:16.842221975 CET5570853192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:16.903183937 CET53557088.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:17.525993109 CET5680353192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:17.582118034 CET53568038.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:18.020863056 CET5714553192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:18.077400923 CET53571458.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:18.668761969 CET5535953192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:18.727881908 CET53553598.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:19.055500031 CET5830653192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:19.111709118 CET53583068.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:19.295212030 CET6412453192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:19.343066931 CET53641248.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:19.796638966 CET4936153192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:19.852883101 CET53493618.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:20.430563927 CET6315053192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:20.486757994 CET53631508.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:21.181947947 CET5327953192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:21.232682943 CET53532798.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:21.677417994 CET5688153192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:21.733674049 CET53568818.8.8.8192.168.2.3
                                Jan 20, 2021 17:15:24.502064943 CET5364253192.168.2.38.8.8.8
                                Jan 20, 2021 17:15:24.559706926 CET53536428.8.8.8192.168.2.3

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Jan 20, 2021 17:12:53.715147018 CET192.168.2.38.8.8.80x8479Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:12:59.203219891 CET192.168.2.38.8.8.80xe3aeStandard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:04.612528086 CET192.168.2.38.8.8.80x8ef4Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:10.573229074 CET192.168.2.38.8.8.80xe472Standard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:27.398511887 CET192.168.2.38.8.8.80xca6eStandard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:44.700119019 CET192.168.2.38.8.8.80x351dStandard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:01.463038921 CET192.168.2.38.8.8.80x94d4Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:06.915060997 CET192.168.2.38.8.8.80xc850Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:12.313934088 CET192.168.2.38.8.8.80x9af0Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:17.765189886 CET192.168.2.38.8.8.80x8715Standard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:34.662410975 CET192.168.2.38.8.8.80x70dStandard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:51.294055939 CET192.168.2.38.8.8.80x5b8eStandard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:07.953716993 CET192.168.2.38.8.8.80x40c7Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:13.571491957 CET192.168.2.38.8.8.80x7292Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:19.055500031 CET192.168.2.38.8.8.80x5a57Standard query (0)kcfresh.duckdns.orgA (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:24.502064943 CET192.168.2.38.8.8.80x377bStandard query (0)kcfresh.ddns.netA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Jan 20, 2021 17:12:53.936311007 CET8.8.8.8192.168.2.30x8479No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:12:59.251117945 CET8.8.8.8192.168.2.30xe3aeNo error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:04.668864012 CET8.8.8.8192.168.2.30x8ef4No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:10.630872011 CET8.8.8.8192.168.2.30xe472No error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:27.457781076 CET8.8.8.8192.168.2.30xca6eNo error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:13:44.757843018 CET8.8.8.8192.168.2.30x351dNo error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:01.684941053 CET8.8.8.8192.168.2.30x94d4No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:06.971584082 CET8.8.8.8192.168.2.30xc850No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:12.535736084 CET8.8.8.8192.168.2.30x9af0No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:17.825486898 CET8.8.8.8192.168.2.30x8715No error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:34.718652010 CET8.8.8.8192.168.2.30x70dNo error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:14:51.350522041 CET8.8.8.8192.168.2.30x5b8eNo error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:08.320425987 CET8.8.8.8192.168.2.30x40c7No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:13.628048897 CET8.8.8.8192.168.2.30x7292No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:19.111709118 CET8.8.8.8192.168.2.30x5a57No error (0)kcfresh.duckdns.org185.140.53.227A (IP address)IN (0x0001)
                                Jan 20, 2021 17:15:24.559706926 CET8.8.8.8192.168.2.30x377bNo error (0)kcfresh.ddns.net105.112.102.172A (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                High Level Behavior Distribution

                                Click to dive into process behavior distribution

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:17:12:32
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\company profile.exe'
                                Imagebase:0xec0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.252435267.000000000341D000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.253304124.00000000043C1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.253470598.0000000004415000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:17:12:45
                                Start date:20/01/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmp75B1.tmp'
                                Imagebase:0x1310000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:12:46
                                Start date:20/01/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6b2800000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:12:47
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x2f0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:12:48
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x1d0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:12:48
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0xdb0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.586154490.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.590173141.00000000031E1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.594725698.0000000004229000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.596680972.0000000005BD0000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.596680972.0000000005BD0000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.597017105.0000000006840000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:17:12:51
                                Start date:20/01/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp132E.tmp'
                                Imagebase:0xb90000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:12:51
                                Start date:20/01/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6b2800000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:12:54
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\company profile.exe' 0
                                Imagebase:0x850000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.309768585.0000000002DB3000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.312703625.0000000003CE1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.312777066.0000000003D37000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                General

                                Start time:17:13:12
                                Start date:20/01/2021
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\UnShSbgF' /XML 'C:\Users\user\AppData\Local\Temp\tmpCFD7.tmp'
                                Imagebase:0xb90000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:13:13
                                Start date:20/01/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6b2800000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:13:13
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x3b0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:13:14
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0x3d0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:13:15
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0xf0000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:17:13:15
                                Start date:20/01/2021
                                Path:C:\Users\user\Desktop\company profile.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0x570000
                                File size:1499648 bytes
                                MD5 hash:02F3EEF9DA2EF90D0CF59BFACA176886
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.329006639.0000000003AA9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.328915349.0000000002AA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.327635694.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >

                                  Executed Functions

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID: <$\bn#
                                  • API String ID: 0-1705670590
                                  • Opcode ID: 5596bbaac9ebf806b77a921bf7c744284f50000ac7db1b087b715c6e1898c54c
                                  • Instruction ID: 230821dfcea063d16d8bbbdff3be4ab0f5600012e7524d1d233b1a74bfe35585
                                  • Opcode Fuzzy Hash: 5596bbaac9ebf806b77a921bf7c744284f50000ac7db1b087b715c6e1898c54c
                                  • Instruction Fuzzy Hash: D551A775E046188FDB58CFAAC9506DDFBF2BF89304F14C1AAD519AB224EB345A81CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 207a55348d1b82ece8eea06790e81b50a46325def9d01261be95d93333167a6f
                                  • Instruction ID: 9d6164adfda27d452ca8935b1d232a663936a813f272c8d7fa06553aed10a1f6
                                  • Opcode Fuzzy Hash: 207a55348d1b82ece8eea06790e81b50a46325def9d01261be95d93333167a6f
                                  • Instruction Fuzzy Hash: A9610375D092589FCF51CFB8D8806EEFBF0AF0A314F19949AD841AB211D335AA46DB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0334170C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: CheckDebuggerPresentRemote
                                  • String ID:
                                  • API String ID: 3662101638-0
                                  • Opcode ID: 7f567bebf52d25b8c753cb48325430b2a80f29c675ce25439858e734c1ccf63b
                                  • Instruction ID: 783e482e3f42824aeabac40916de04953075ece4ed5a54ac3f0ede5e10227e8c
                                  • Opcode Fuzzy Hash: 7f567bebf52d25b8c753cb48325430b2a80f29c675ce25439858e734c1ccf63b
                                  • Instruction Fuzzy Hash: 78510579D092589FCF11CFA8D8806EEFBF0BF0A314F29945AD444AB211D334A946DF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0334170C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: CheckDebuggerPresentRemote
                                  • String ID:
                                  • API String ID: 3662101638-0
                                  • Opcode ID: fb24a4549e257d2bd17068c625d2d83f3cc527fbdb3f2346b61c2b3fd5b4f8e5
                                  • Instruction ID: 2c04b85e535407bdc3d9fa00059ecdb2dd85a1884f36b2a3c03a6bbc2ea5a808
                                  • Opcode Fuzzy Hash: fb24a4549e257d2bd17068c625d2d83f3cc527fbdb3f2346b61c2b3fd5b4f8e5
                                  • Instruction Fuzzy Hash: D841BCB9D04258DFCB00CFA9D584AEEFBF4AB09314F14905AE414B7250D738AA89CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID: >hNG
                                  • API String ID: 0-4046879918
                                  • Opcode ID: 717a0d71178032a8c68b6e268e047357c0bed689249743952cb33f78df051994
                                  • Instruction ID: 2a0874789c9a9c486e609b4c860a7c76dc2434d642d653bc81598f4df51951d3
                                  • Opcode Fuzzy Hash: 717a0d71178032a8c68b6e268e047357c0bed689249743952cb33f78df051994
                                  • Instruction Fuzzy Hash: 9D51F074E046198BCB14DFE9C9805DDFBB6BF89300F24862AD51AAB614EB70A985CF00
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d23af1ec4e8acac24ef2a4e9adadefb05c6ed2f655df57d45e167ed7f56ef463
                                  • Instruction ID: f886ce0c842127ffb58df31fde3cc6a4053dea579752d87681ea2ed484bb6ca6
                                  • Opcode Fuzzy Hash: d23af1ec4e8acac24ef2a4e9adadefb05c6ed2f655df57d45e167ed7f56ef463
                                  • Instruction Fuzzy Hash: 83C14570E05218CFCB24DFA9D9846DDFBFAFB89300F108469D54AAB654DB34A941CF25
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc7a8f2a3f226abb575ddc4e9abb9149a320a02305d3b2871991bc8e909deb30
                                  • Instruction ID: a23313944b02e91bb0435d7f9a2e77781609fcf9cbc56ff7426b3da786ffa453
                                  • Opcode Fuzzy Hash: dc7a8f2a3f226abb575ddc4e9abb9149a320a02305d3b2871991bc8e909deb30
                                  • Instruction Fuzzy Hash: D7B11474E142598FCB05CFE9D8806EEFBF2EF8A300F14986AD915AB255D730A946CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98e8fcef2cb242aad7b1722e9f2d9ed294f2254867800b63f66dbb83f91f453c
                                  • Instruction ID: cb7eece29903f6969b8714ded0e56c15b7342a3596bf0e4d2d26a49f9eae2933
                                  • Opcode Fuzzy Hash: 98e8fcef2cb242aad7b1722e9f2d9ed294f2254867800b63f66dbb83f91f453c
                                  • Instruction Fuzzy Hash: 4491A235E003198FCB04DBA4D8949DDBBBAFF89304F248659E41AAB7A4DB30A945CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89de57f4761c68f8fa9d29542ee2ce7ae3a02c462e9d315d9b13c9bcd2b14cf3
                                  • Instruction ID: 70b79551d1d3cff4c7aa44e20bde0e4888da4917f28bf3e1e562f01ab0cdc9ae
                                  • Opcode Fuzzy Hash: 89de57f4761c68f8fa9d29542ee2ce7ae3a02c462e9d315d9b13c9bcd2b14cf3
                                  • Instruction Fuzzy Hash: 46818135E003199FCB04DFE0D8948DDBBBAFF8A300F258259E415AB764EB30A985CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d53c5f9cd21660aaa33cb4cb7ece9d31601441d7af1776cd5094651d206bf28
                                  • Instruction ID: ba7737b9ba6a455d9d64817e8ec739c01c5065fa66c4ca3ad5d05579eae78126
                                  • Opcode Fuzzy Hash: 7d53c5f9cd21660aaa33cb4cb7ece9d31601441d7af1776cd5094651d206bf28
                                  • Instruction Fuzzy Hash: 9C81B074E142198FDB08CFE9D880AAEFBB6EF89300F14942AE519BB354D734A941CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1863fcc9e3164af818caa124da8d898445e069ae3f574f0ee693ef03db845be
                                  • Instruction ID: 781a69bc019a502646b9a75100ff0abf8be0938c57fefe4d3be04eb8686dbdb1
                                  • Opcode Fuzzy Hash: c1863fcc9e3164af818caa124da8d898445e069ae3f574f0ee693ef03db845be
                                  • Instruction Fuzzy Hash: 166126B0D052198FCB09CFA9D8906AEFBF2FF8A200F18C96AD409F7255D7345A41CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a96cb6511648a0838e4a547e78004a3752f45523f0140fb53e8560f51c6e184a
                                  • Instruction ID: bd73d24e7eb7e8a4beed6ed0263ddc0a1e9ef9b143753fb5c2af711f449f8a21
                                  • Opcode Fuzzy Hash: a96cb6511648a0838e4a547e78004a3752f45523f0140fb53e8560f51c6e184a
                                  • Instruction Fuzzy Hash: 7051E474E056188FDB54CFAAC984A8EFBF7BF89314F08C5A6C408AB215D730A985CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd4ffd496acf220777d9663b89515f35d4449bbcb6f5c616ac9095e1ece5635d
                                  • Instruction ID: c05d29ac5f90eba9b9475a7b3d8acb9d3f1846cfe39136a0e309d5d1ea870163
                                  • Opcode Fuzzy Hash: cd4ffd496acf220777d9663b89515f35d4449bbcb6f5c616ac9095e1ece5635d
                                  • Instruction Fuzzy Hash: 1B410A74E1521ADFCB44CFAAC580AAEFBF6FF85200F14C9AAC415A7215D334AA418F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0066e6445827765bf011b21578896c1243b27792da104daef9a800409d2ea393
                                  • Instruction ID: 5bc46b635106bdf02660242a673323b79d9d681ddc31c744c8d68747c4f60c32
                                  • Opcode Fuzzy Hash: 0066e6445827765bf011b21578896c1243b27792da104daef9a800409d2ea393
                                  • Instruction Fuzzy Hash: FA41CBB4D002189FDB10CFA9C984BDEFBF0BB09304F24902AE404BB261CB74A989CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c5ce94867cf4c7873a420bcc38f8c718aeaa59e41704aa5beceec2a1762b725
                                  • Instruction ID: c4505d9b4674edc02b6f64cd8a899ab11cd9c4e81831a1505b7ca4f4ddc1b99f
                                  • Opcode Fuzzy Hash: 5c5ce94867cf4c7873a420bcc38f8c718aeaa59e41704aa5beceec2a1762b725
                                  • Instruction Fuzzy Hash: 6B31F871E006188BDB18CFAAD8843DEBBF2AFC9310F14C16AD408A7258DB741A56CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 059C8128
                                  • GetCurrentThread.KERNEL32 ref: 059C8165
                                  • GetCurrentProcess.KERNEL32 ref: 059C81A2
                                  • GetCurrentThreadId.KERNEL32 ref: 059C81FB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 5c01c6fa2a4f62a3f369a846734a29d190bdc34a33d0feaf93b18ed04619f976
                                  • Instruction ID: a30aefa5c6b5b05e12e3f6e2cf597003118e3cd5d79792a6c973347ca21462f2
                                  • Opcode Fuzzy Hash: 5c01c6fa2a4f62a3f369a846734a29d190bdc34a33d0feaf93b18ed04619f976
                                  • Instruction Fuzzy Hash: 9D5154B09007498FDB10CFA9DA88BEEBFF4FF49304F258499E009A7291D7345884CB66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 059C8128
                                  • GetCurrentThread.KERNEL32 ref: 059C8165
                                  • GetCurrentProcess.KERNEL32 ref: 059C81A2
                                  • GetCurrentThreadId.KERNEL32 ref: 059C81FB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 85310b6a173c4291d7240a02348d45caec0a7ff83664bd828e5d028f42cd1f20
                                  • Instruction ID: 9aee147e4e8b6c0374a0009caed8ecb7b54996a0b04c881ff62da07894bfcc31
                                  • Opcode Fuzzy Hash: 85310b6a173c4291d7240a02348d45caec0a7ff83664bd828e5d028f42cd1f20
                                  • Instruction Fuzzy Hash: DA5143B09007499FDB10CFA9DA88BEEBFF5FF48304F218459E409A7290D7345884CB66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 059C5F02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: f734713e538d6a012981a666049e31d0cd3ccbd05468ebd683f7ee4e12923022
                                  • Instruction ID: cfd8e14e27d69aad4976efdb2bd40af35e0fa3d8f89549461539cc5966f4a92e
                                  • Opcode Fuzzy Hash: f734713e538d6a012981a666049e31d0cd3ccbd05468ebd683f7ee4e12923022
                                  • Instruction Fuzzy Hash: 0991F370A00B098FDB24CF69D484AAABBF5BF89304F11896EE446E7B50D734A845CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 059CC639
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: f680994db5b11092126e1b0e8527a948e405d70439f158d79f25f15c2497c725
                                  • Instruction ID: 8db6226e11e9016548c402574f33ddc78330450f6690aef16522d5d789e830e8
                                  • Opcode Fuzzy Hash: f680994db5b11092126e1b0e8527a948e405d70439f158d79f25f15c2497c725
                                  • Instruction Fuzzy Hash: 05717AB4D04218DFDF20CFA9D984ADDBBF1BB09314F54A1AAE818B7211D730AA85CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 059CC639
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: b658eb79cef420dffbc150b9e752c316ff75566b5719eba87cec37e44925456d
                                  • Instruction ID: 8d20fff38306529965b1cbffbb8dbc9d20fdb1f4c6933ad50c3d1af95e16f2d1
                                  • Opcode Fuzzy Hash: b658eb79cef420dffbc150b9e752c316ff75566b5719eba87cec37e44925456d
                                  • Instruction Fuzzy Hash: 49717AB4D042189FDF20CFA9D984ADDBBF1BB09304F5491AAE818B7211D730AA85CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 059C1CF1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 712993c9edf856d894d34a9c49d6fe33ae95cc9b9ad77aee1f3c3c7f676e7f6b
                                  • Instruction ID: 4cd4cd635292778d2ab40b17f2afab57eb7abc569755eb7c75909f6ab1e5fe55
                                  • Opcode Fuzzy Hash: 712993c9edf856d894d34a9c49d6fe33ae95cc9b9ad77aee1f3c3c7f676e7f6b
                                  • Instruction Fuzzy Hash: 6751E771D0462D8FDB20CFA8C880BDEBBB5BF45304F1184AAD509AB251DB756A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 059C1CF1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 44205cb9d88afff235c8a2af51887ce91bafcd79f3525a160382b2e7ff4c2a19
                                  • Instruction ID: 7dc2ce9a95b01081249ebcc5c606b392c8cc6c2038f4a891884c9b14d8efc89c
                                  • Opcode Fuzzy Hash: 44205cb9d88afff235c8a2af51887ce91bafcd79f3525a160382b2e7ff4c2a19
                                  • Instruction Fuzzy Hash: EB51F671D0462C8FDB20CFA8C880BDEBBB5FF45304F1184AAD509AB251DB756A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 059C83BB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 66712a6bee1ef74f36ee459b3f084893e687d5c75dc788195cae8bc9b5169e7d
                                  • Instruction ID: 50a72dac0be06a347041a499cd5ebf94876caabc9ebaf1cbbced9f730a1c0629
                                  • Opcode Fuzzy Hash: 66712a6bee1ef74f36ee459b3f084893e687d5c75dc788195cae8bc9b5169e7d
                                  • Instruction Fuzzy Hash: 4D4165B9D042589FCF00CFA9D984ADEBBF5BB09310F15906AE918BB310D335A985CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 059C83BB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 3a7b8a097784cbfd1d1dba56b1771157db29edb894e365265cc01602c024e943
                                  • Instruction ID: 67b6e4403160c80573eabf6c051d3391198b5c9702d8744d8c54b321dedf9f46
                                  • Opcode Fuzzy Hash: 3a7b8a097784cbfd1d1dba56b1771157db29edb894e365265cc01602c024e943
                                  • Instruction Fuzzy Hash: 114166B9D042589FCF00CFA9D984ADEBBF5BB09310F15906AE918BB310D335A945CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 059C622A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 6786b44c941d73922f746df251e5ce423b4fa23de931184f9c801843c559e1d6
                                  • Instruction ID: 7fa73b4e83156c5c68f847a255509e78dfb67704e92a0cd088cbe86f0649aa60
                                  • Opcode Fuzzy Hash: 6786b44c941d73922f746df251e5ce423b4fa23de931184f9c801843c559e1d6
                                  • Instruction Fuzzy Hash: 5141A9B4D042589FCF10CFA9D884ADEFBF5BB09310F14906AE818BB210D334A946CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 059C622A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: c50e849697ba11753986d80460ea0577da474cd37baac6e7543734d44bcd00b8
                                  • Instruction ID: 684aa920798a8ee37a33ed3e535101aff40a32c25396451dae02deb84fb63e1f
                                  • Opcode Fuzzy Hash: c50e849697ba11753986d80460ea0577da474cd37baac6e7543734d44bcd00b8
                                  • Instruction Fuzzy Hash: DC4197B4D042589FCB10CFAAD884AAEFBF5BB49310F14906AE915B7310D334A946CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 059CF0A1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: bc1fb5f99da124e967e7580c008fd36d0d905a390c6e4039eb874fa180807069
                                  • Instruction ID: eaf576a3e1deb17b58c40990007de5562ffb86f54258cc165c817543dcda8e9f
                                  • Opcode Fuzzy Hash: bc1fb5f99da124e967e7580c008fd36d0d905a390c6e4039eb874fa180807069
                                  • Instruction Fuzzy Hash: 504149B8A00605CFCB14CF99C488AAABFF6FB88314F15C489D519AB321D735A841CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 03341837
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 5d8c976fe781f5df039d81e2b9361c266e08b8634b4e13b6f23a715c2eb9420d
                                  • Instruction ID: 8cc252686ad0d3e479b9f346a869fecd41c8d2d60c8a57802df7f2dfde709beb
                                  • Opcode Fuzzy Hash: 5d8c976fe781f5df039d81e2b9361c266e08b8634b4e13b6f23a715c2eb9420d
                                  • Instruction Fuzzy Hash: C03198B9D042589FCF10CFA9E984AEEFBF5BB59310F14902AE814B7210D735A985CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 03349DFF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 3bf50509919374e654d9c5c7911f2318e4f03d8fa3476ffad0463713ea23c67c
                                  • Instruction ID: 9577c97419fa44e2e452563ea21ea445616bd6b868aabd67142a2de0b12bdcbe
                                  • Opcode Fuzzy Hash: 3bf50509919374e654d9c5c7911f2318e4f03d8fa3476ffad0463713ea23c67c
                                  • Instruction Fuzzy Hash: 0D3198B9D042589FCF10CFA9D984AEEFBF5BB09314F14902AE814B7210D735A985CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 03341837
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: b25c5237f0f8beba469b3147a0a960ad9cb5f61b7b5cb60a094eeda93217aa36
                                  • Instruction ID: 749933dc5521fc5ac2eb7f54a07a92cca0bdf0f555fcf5c34e5ad5d6626a446a
                                  • Opcode Fuzzy Hash: b25c5237f0f8beba469b3147a0a960ad9cb5f61b7b5cb60a094eeda93217aa36
                                  • Instruction Fuzzy Hash: 383189B9D042589FCF10CFA9D984ADEFBF5BB09314F14902AE814B7210D775A985CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • OutputDebugStringW.KERNELBASE(?), ref: 0334C2AA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID: DebugOutputString
                                  • String ID:
                                  • API String ID: 1166629820-0
                                  • Opcode ID: 22f7f405d5e707f9015c7d81e73d4919e76ab642bf24258915693a831bee2475
                                  • Instruction ID: e0da97fa8aa6307fe66e2c25bf857ecdd3badba4c2e72567dfb2a1f9333f70ce
                                  • Opcode Fuzzy Hash: 22f7f405d5e707f9015c7d81e73d4919e76ab642bf24258915693a831bee2475
                                  • Instruction Fuzzy Hash: 5431BAB4D052189FCF10CFA9D984ADEFBF5AB49314F14902AE818B7320D775A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 059C5F02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 71bd52b92e0c4e8b133dccf13ca3beb5699bbe7aa96e58256e4ba8e0a08f8299
                                  • Instruction ID: 2e13c0ec378ed9401ba659c1772de055dd4584a6180a03cf0744ced878376a45
                                  • Opcode Fuzzy Hash: 71bd52b92e0c4e8b133dccf13ca3beb5699bbe7aa96e58256e4ba8e0a08f8299
                                  • Instruction Fuzzy Hash: CC31C7B4D002189FCB14CFAAD884ADEFBF5BB49314F15806AE818B7320D334A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.251915008.000000000190D000.00000040.00000001.sdmp, Offset: 0190D000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f978006f031cc65b15297ea4810de7c6f79fd091a38d5af7cfb3f7495dc053d8
                                  • Instruction ID: a3d6dc26f609ceb8cf60c87ea76e7b05f457196d5e1aa7d6a5731ca0d7e67883
                                  • Opcode Fuzzy Hash: f978006f031cc65b15297ea4810de7c6f79fd091a38d5af7cfb3f7495dc053d8
                                  • Instruction Fuzzy Hash: 5821F571504244DFDB16CFA4D9C4B26BBB9FB88354F24C96DD90D4B286C337D846CA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.251915008.000000000190D000.00000040.00000001.sdmp, Offset: 0190D000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1634690fb963a58e4e786e327c84160adc3c6b9f5f52cf29ba2d57553d863054
                                  • Instruction ID: 9726a1575fbb9633876b36bc97c71fdc72a94d1f9fab94515815a6ad4ab40642
                                  • Opcode Fuzzy Hash: 1634690fb963a58e4e786e327c84160adc3c6b9f5f52cf29ba2d57553d863054
                                  • Instruction Fuzzy Hash: 4C118B75504280DFDB12CF94D5C4B15BBB2FB84324F28C6AAD84D4B696C33AD45ACBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.251900439.00000000018FD000.00000040.00000001.sdmp, Offset: 018FD000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 570526db6a90df8a945d6ec321bd0a74cf2d3c531d2d49ddbe50888d7d35d210
                                  • Instruction ID: 43b4bb6fdf4d0add112d5603f7223403b4db8ae4fc58e8bde7c7b76ac2334009
                                  • Opcode Fuzzy Hash: 570526db6a90df8a945d6ec321bd0a74cf2d3c531d2d49ddbe50888d7d35d210
                                  • Instruction Fuzzy Hash: FD01A7714083C89AE7104AA9CD847A7FB9CEF45368F18C65DEF049F242D7799944CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.251900439.00000000018FD000.00000040.00000001.sdmp, Offset: 018FD000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f8bd97d8a453fccd851f309a380daf5f880943607cc4604933cea7e2c40cc71c
                                  • Instruction ID: ac790f269373a09d6e02f68f8ea8dee0d8e83cc99d534364f84d8298c672c674
                                  • Opcode Fuzzy Hash: f8bd97d8a453fccd851f309a380daf5f880943607cc4604933cea7e2c40cc71c
                                  • Instruction Fuzzy Hash: 0DF068714042849EE7118A59CD84766FF98EB41774F18C55AEE045F282D3759844CA71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID: n}$$n}$$n}$
                                  • API String ID: 0-2441052029
                                  • Opcode ID: 6578231a664e445f00d0aa01887db482609e65470a320219bbdf9ed181b3452a
                                  • Instruction ID: bcfc73fe8971c39ecce0b3f6cb24eac9e5f9ac0aab72bb4a44bb5d97ffb842ba
                                  • Opcode Fuzzy Hash: 6578231a664e445f00d0aa01887db482609e65470a320219bbdf9ed181b3452a
                                  • Instruction Fuzzy Hash: 0F61F574E15209CFCB08CFAAC5855DEFBF6BF89210F24956AE415BB314D334AA418F64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID: n}$$n}$$n}$
                                  • API String ID: 0-2441052029
                                  • Opcode ID: 817e427a217df78e347a8a5f55bec2faf4e3bb67c439086951b35b3a7881dfab
                                  • Instruction ID: 50ba23e9ea11feb0e4627a705fd0508c074ec8f8d630269a1c22eb9ed28fc6ea
                                  • Opcode Fuzzy Hash: 817e427a217df78e347a8a5f55bec2faf4e3bb67c439086951b35b3a7881dfab
                                  • Instruction Fuzzy Hash: B2611474E05209CFCB08CFAAC5855EEFBF6FF89210F24956AE415BB354D334AA418B64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID: m/
                                  • API String ID: 0-1649136663
                                  • Opcode ID: 7533b4f92eedcb35beddfc7dccef1b9c71d3419a744dfe1f397b2f04b74a1048
                                  • Instruction ID: 2955a6bb430352af280ee8908194f3e368f7d8758d26c16adfa4a250b4038210
                                  • Opcode Fuzzy Hash: 7533b4f92eedcb35beddfc7dccef1b9c71d3419a744dfe1f397b2f04b74a1048
                                  • Instruction Fuzzy Hash: 35517D74E1460ACFDB04CFA9C5C06AEFBF6FF86300F6486A9C909A7205D7346A41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6febd35b3debf4216d76b64df2775b491ac45c052ec902b94cbfd518ce8948cb
                                  • Instruction ID: f03f4ec060507ff1bd75565c77ae6e34d905e87d94bc77514aa218e64a88a17f
                                  • Opcode Fuzzy Hash: 6febd35b3debf4216d76b64df2775b491ac45c052ec902b94cbfd518ce8948cb
                                  • Instruction Fuzzy Hash: 0612B9F14917468BD310EF65FA9C1893BB1F7E6328B70C289D1611BAD8DBB9114ACF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c1d5754780cbdfef6ad6da304ece21e9176543b005f58a4d8d4463bef028260
                                  • Instruction ID: a36fb76dd2ff62e1f76013b6e2ba911d6edd5dcba9a164336fc40fa60a68825c
                                  • Opcode Fuzzy Hash: 8c1d5754780cbdfef6ad6da304ece21e9176543b005f58a4d8d4463bef028260
                                  • Instruction Fuzzy Hash: 8DA18032E00219CFCF05DFB5C8485DEBBB6FF85300B1581AAE806AB225EB35A945CB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a82f3443365caf0501b2ad71bf3d6b3d5bfa8a13cd68bab2622464e08e1cdae0
                                  • Instruction ID: 4528432bf2b320e29d507700c8a547c2b8ecc4eff6b974506e76453ec977acdb
                                  • Opcode Fuzzy Hash: a82f3443365caf0501b2ad71bf3d6b3d5bfa8a13cd68bab2622464e08e1cdae0
                                  • Instruction Fuzzy Hash: 09A1F474E15219CFDB44CFA9D5809AEFBF2FF4A310F2495A9E41AAB210D334AA41CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1f2497e7c19fb55b2c64e8b45aceb4b716dee6018aef716917e02494a6c1ade
                                  • Instruction ID: 22fd8632d36970b41a4ef74dbac64971a9ccfca413dce543e5a2f98cf0b76062
                                  • Opcode Fuzzy Hash: b1f2497e7c19fb55b2c64e8b45aceb4b716dee6018aef716917e02494a6c1ade
                                  • Instruction Fuzzy Hash: 79C118B18517458AD310EF64FA8C1893BB1FBE6328F708288D1612B6D8DBB9154ACF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56f380642d8e02b9f7a57196cef3e873ab5111407f0ea7da5901f088a461f27b
                                  • Instruction ID: b44eb63dae2383bc71aec37913032445aa2c882582a546e198e268826d28f9ff
                                  • Opcode Fuzzy Hash: 56f380642d8e02b9f7a57196cef3e873ab5111407f0ea7da5901f088a461f27b
                                  • Instruction Fuzzy Hash: C2814AB8D0520ADFCB04CF99D5809AEFBF5FF88360F14952AD456AB210C338AA51CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03d0b46970587c6f3d16a45b509c98a772a7092fcf5e66577eb318134a528369
                                  • Instruction ID: 68a8d1f85c23a9a4f3fb536dc59a32af64f2295d2923c276394f9f6cfc780fbb
                                  • Opcode Fuzzy Hash: 03d0b46970587c6f3d16a45b509c98a772a7092fcf5e66577eb318134a528369
                                  • Instruction Fuzzy Hash: 4C81FF74E14219CFDB44CFA9D5809AEFBF2FF89210F249569E409AB324D370AA42CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 113c332cce75010f44f849f446bac445a0ece82b08306886b09196b00762a19b
                                  • Instruction ID: eef017b504b6b2a7e9d109a56ef691fb16b01a6be04e97122277964361af8096
                                  • Opcode Fuzzy Hash: 113c332cce75010f44f849f446bac445a0ece82b08306886b09196b00762a19b
                                  • Instruction Fuzzy Hash: 0981EF74E15219CFDB44CFA9D5809AEFBF2FF8A310F14956AE405AB220D370AA42CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27f4400ac5374c5a86315f6f6a9eeb9d077e9d7811ea3dcda695ff1d28f88117
                                  • Instruction ID: 6f3eb98817eb824aa09c5386f1a21834f69a8fc5d018fcfa2e9ae77da06a48c3
                                  • Opcode Fuzzy Hash: 27f4400ac5374c5a86315f6f6a9eeb9d077e9d7811ea3dcda695ff1d28f88117
                                  • Instruction Fuzzy Hash: 7A811274E0520ACFCB00CFA9C5809EEFBF5FF4A210F188566D415A7255D334A982CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6816544e4a41da42fb679289f45c3f457fc282d2bef11182f96de18b0e4e5260
                                  • Instruction ID: 5dadb0643c56e31d41fbce556d33f2dceaae68cff292425e9b37bf5c3ad804e0
                                  • Opcode Fuzzy Hash: 6816544e4a41da42fb679289f45c3f457fc282d2bef11182f96de18b0e4e5260
                                  • Instruction Fuzzy Hash: F5710BB1D056188BDB19DF7B8D8429AFBF3BFC6300F19D0AAC418AB215DB345A429F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97a4fe01633705d6fb5fa5f86fec139d062d4ab788c0513fe8246964f72a792e
                                  • Instruction ID: c19326c9cac296df50d0ab5d6f9d76d25b55a7001c31770ee3561ecc4412e770
                                  • Opcode Fuzzy Hash: 97a4fe01633705d6fb5fa5f86fec139d062d4ab788c0513fe8246964f72a792e
                                  • Instruction Fuzzy Hash: 407103B4D0520ACFCB04CF99C5808EEFBF6FF89240F588529D416AB224D334A982CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 468eff2523cf4a9e738640eec110eca3fadf8845b47ac5631404291d98dc34a9
                                  • Instruction ID: 0aafa08482a6c8505ff41fe903eb2cf31d8ec021a03d81900ca3c3b377790ac7
                                  • Opcode Fuzzy Hash: 468eff2523cf4a9e738640eec110eca3fadf8845b47ac5631404291d98dc34a9
                                  • Instruction Fuzzy Hash: 0B710474E0520ADFCB04CFA9C5809AEFBF6FF8A310F188566D415A7225D334A982CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d38f19580cf191ca61e1f6bf69b9b2f1a4d6adf82947951fc6ab685bd97739f9
                                  • Instruction ID: 635344d5bfcdf138175e6441052c9310f5c636076a38703c0766f6db384f0cf7
                                  • Opcode Fuzzy Hash: d38f19580cf191ca61e1f6bf69b9b2f1a4d6adf82947951fc6ab685bd97739f9
                                  • Instruction Fuzzy Hash: 60514E74E14119CBDB14CF9AD9806AEFBF6FB89304F24C5A9D418A7315D730A9418FA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94c1bc0628b470da629e6ea46b2c3f91576427ae1c53a94544d5db6f6e6abbd5
                                  • Instruction ID: 9e3565d16efc5852b96112432706061ebced9288192030dedc112711244a5e8c
                                  • Opcode Fuzzy Hash: 94c1bc0628b470da629e6ea46b2c3f91576427ae1c53a94544d5db6f6e6abbd5
                                  • Instruction Fuzzy Hash: 5A511874E1520ADFCB08CFA9C5825AEFBF2FF8A350F24E56AC405A7214D3709A41CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d5e9bd8e05f344ea7caf9dcbe354197c6b329f7f8a90ce252d28742eba3a1329
                                  • Instruction ID: 037df434fc8e373e20f5f595668303e2cbb63afd1a150949c8c219fe8a5975c3
                                  • Opcode Fuzzy Hash: d5e9bd8e05f344ea7caf9dcbe354197c6b329f7f8a90ce252d28742eba3a1329
                                  • Instruction Fuzzy Hash: 94510974E1520ADBCB04CFA9C5825AEFBF6FF89350F24E46AC505B7214D370AA41CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b344579bfb6e46a79287f959a36b36ae07cac690eb6d294cb1a62541dfd32ad9
                                  • Instruction ID: 1047343d8e4e65839a78b2014a265464333a92b83549dc725f706043c6b17637
                                  • Opcode Fuzzy Hash: b344579bfb6e46a79287f959a36b36ae07cac690eb6d294cb1a62541dfd32ad9
                                  • Instruction Fuzzy Hash: B541E874E0460A9FCB48DFAAC5815AEFBF2FF8A300F14C56AC415A7258D734AA41CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b377378956ef3a3a028cac22472c5a4f0a7de7cdf0de7a418021e82df8a5c52
                                  • Instruction ID: fc37f89cf1f3250a639ac61ae4295eebb0ac50309ad14017c3e6431d25993db2
                                  • Opcode Fuzzy Hash: 0b377378956ef3a3a028cac22472c5a4f0a7de7cdf0de7a418021e82df8a5c52
                                  • Instruction Fuzzy Hash: B041E9B4E0460A9FCB08DFAAC5815AEFBF6FF89300F14D46AC415A7258D734AA418F95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b29a388e6ceaa23970c6902203b7c1b96c1633e89b2a3049df906ecfdca22b73
                                  • Instruction ID: 166efe84c5a52586fe2b7501540b619d841a4487fdc18c8803d7623c8a3e5062
                                  • Opcode Fuzzy Hash: b29a388e6ceaa23970c6902203b7c1b96c1633e89b2a3049df906ecfdca22b73
                                  • Instruction Fuzzy Hash: 96411674E152198FCB44CFAAC4809EEBBF5BF89210F14966AD415B7224D7309A41CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92072faa45db5a8bae6cd035694fdfae7e944e650a393c7e167bbec9ab17b0e1
                                  • Instruction ID: d8681dcdf0abf0f6a7588e31da8a81c9c9cd688c243bb49b7d1bb518342cbed4
                                  • Opcode Fuzzy Hash: 92072faa45db5a8bae6cd035694fdfae7e944e650a393c7e167bbec9ab17b0e1
                                  • Instruction Fuzzy Hash: 4E411374A10219CFDB50CFA9C985A8EFBF6BF8A310F09C695D409AB216C334E981CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 378241ff1cc3f745ae935f49a4e48cf59e9a6b3902a2a7dbe950448cdd0b512d
                                  • Instruction ID: c5c2ea39aa0f15000aae3f55d78ff8efbdfa7d8b60340d4a64e295100ab51b03
                                  • Opcode Fuzzy Hash: 378241ff1cc3f745ae935f49a4e48cf59e9a6b3902a2a7dbe950448cdd0b512d
                                  • Instruction Fuzzy Hash: 6831BBB8D052589FCB10CFA9E984ADEFBF5BB49314F24906AE404B7310D335A945CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 215eccc8017a15479350af05832562d0c142e1f43bc46c8d70540a93808ac2b1
                                  • Instruction ID: 78c4644f4f24c04e45eb8d28674bcc9c69a8e8bb261c96e4b63883264ea1b9f6
                                  • Opcode Fuzzy Hash: 215eccc8017a15479350af05832562d0c142e1f43bc46c8d70540a93808ac2b1
                                  • Instruction Fuzzy Hash: 6731AAB9D052589FCB10CFA9E984ADEFBF5BB49314F24906AE405B7310D334A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e40063cb37c732296798920d73dce8a6754f4d2a1af27b1d680bd9137ea7a15d
                                  • Instruction ID: 6d2738994a32fb00dd4edb4591a1843b5be3e1816d11462ad0face4f2fea3b06
                                  • Opcode Fuzzy Hash: e40063cb37c732296798920d73dce8a6754f4d2a1af27b1d680bd9137ea7a15d
                                  • Instruction Fuzzy Hash: 3B313FB4D05218DFCB14CFA9D984AAEFBF2BB4A350F249229E814B7350D7349945CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.252212293.0000000003340000.00000040.00000001.sdmp, Offset: 03340000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56bdd8c23a0d07c23f51c6c68619d5adceab3b35b27a57426c848d28c3057649
                                  • Instruction ID: 1daca37a0be10f9bd3eb1f0bab988ea9fcec05dc548816cc1f5b50914ee2c224
                                  • Opcode Fuzzy Hash: 56bdd8c23a0d07c23f51c6c68619d5adceab3b35b27a57426c848d28c3057649
                                  • Instruction Fuzzy Hash: 4F21CA71E056188FEB18CFABD84069EFBF7AFC9200F04C5BAC918A6264EB3415458F51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02dc5001691143cd6af34857922e5fd6bb4d302917b1b25b603fa4a053e72d94
                                  • Instruction ID: 82ae117630e17efd78e598ba48ace89bc1d6ce480a2e9f299bfea2eeb4e6a3bb
                                  • Opcode Fuzzy Hash: 02dc5001691143cd6af34857922e5fd6bb4d302917b1b25b603fa4a053e72d94
                                  • Instruction Fuzzy Hash: 3601DB76D052099F8B14DF99D5818DEFBF2FB5A310F14906AE815B3310D331A911CF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.257083901.00000000059C0000.00000040.00000001.sdmp, Offset: 059C0000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                  • Instruction ID: 7b4fbf9275103414a557b1e6a1b9fe583d5bb921438578c19e0c6c4aa0f8a99e
                                  • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                  • Instruction Fuzzy Hash: C3F042B5D0520C9F8F04DFA9D5418EEFBF2AB9A310F10A16AE814B3310E7359951CFA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Executed Functions

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 031AB730
                                  • GetCurrentThread.KERNEL32 ref: 031AB76D
                                  • GetCurrentProcess.KERNEL32 ref: 031AB7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 031AB803
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 560a965fcb22062cd4816e61174aa44ccfed9fa14f35b8676fea9ddf07444c4f
                                  • Instruction ID: f61909d47e9204d6f0071c837e09ed82ad9dd716ed45c155c17be753b25877af
                                  • Opcode Fuzzy Hash: 560a965fcb22062cd4816e61174aa44ccfed9fa14f35b8676fea9ddf07444c4f
                                  • Instruction Fuzzy Hash: 885172B49046888FDB14CFA9D688BEEBBF0AF4C315F24C45AE009B7391D7749884CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 031AB730
                                  • GetCurrentThread.KERNEL32 ref: 031AB76D
                                  • GetCurrentProcess.KERNEL32 ref: 031AB7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 031AB803
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 420db4d20909b323ce83bda3587caf8d9c3860025437d3ed3c9ef87ffd1eb9d5
                                  • Instruction ID: ed8696e379048690669a1f9a0b1c71f040ed8a555f685e3a1bf84e1a7637816e
                                  • Opcode Fuzzy Hash: 420db4d20909b323ce83bda3587caf8d9c3860025437d3ed3c9ef87ffd1eb9d5
                                  • Instruction Fuzzy Hash: 885154B49046888FDB14CFA9D648BEEBBF0BF4C304F248459E119B7391D7749884CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000006.00000002.597261233.0000000006C20000.00000040.00000001.sdmp, Offset: 06C20000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 135e9889cfc97ca48e039007f5a7cf8ab3df748fef5581d2e484b8958324da00
                                  • Instruction ID: eefe46cefe58de1fa68de6f1e01b1f5b528940cc82bd9a5300021103f7b4b4e3
                                  • Opcode Fuzzy Hash: 135e9889cfc97ca48e039007f5a7cf8ab3df748fef5581d2e484b8958324da00
                                  • Instruction Fuzzy Hash: 448158B1D0426ACFDB10CFA9C9806DEBBB5FF49314F10852AD819AB250DB789949CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 031A962E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: ef7fdfbd494feb39f72b3da1ee6ba7bfc8c87d66026b2eed756e24bfab8bcd55
                                  • Instruction ID: 83254c55ee702bb42ba3e4be853ac3feff6a67b768c4ee0008cc5fc342fedf80
                                  • Opcode Fuzzy Hash: ef7fdfbd494feb39f72b3da1ee6ba7bfc8c87d66026b2eed756e24bfab8bcd55
                                  • Instruction Fuzzy Hash: 66716774A00B098FD764DF6AC5417AABBF5FF88205F04892ED44ADBA40EB34E845CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031AFD0A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 658bb306034f7d1e0fc574e8a7c1e94f2185613a12ff7a27c1118c057672da4d
                                  • Instruction ID: 8894833e6e7b55f621de05f014aed267f91b05cfb792695b3b2f3d208c6f732c
                                  • Opcode Fuzzy Hash: 658bb306034f7d1e0fc574e8a7c1e94f2185613a12ff7a27c1118c057672da4d
                                  • Instruction Fuzzy Hash: 9A610275C04249AFCF16CFA9D880ACEBFB5FF49314F19816AE818AB221D7759846CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06C23740
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.597261233.0000000006C20000.00000040.00000001.sdmp, Offset: 06C20000, based on PE: false
                                  Similarity
                                  • API ID: Query_
                                  • String ID:
                                  • API String ID: 428220571-0
                                  • Opcode ID: 31cb94166094282f0010c8c866632d61d374501ed611ea0792ce43a7a6b33709
                                  • Instruction ID: 38737829d643d3e4403f90477a54312e24e7a523c9fd7871a105ba04f9022128
                                  • Opcode Fuzzy Hash: 31cb94166094282f0010c8c866632d61d374501ed611ea0792ce43a7a6b33709
                                  • Instruction Fuzzy Hash: 275134B1D00269DFDF10CFA9C9847DDBBB5BF49704F248529E818AB250DB789945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06C23740
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.597261233.0000000006C20000.00000040.00000001.sdmp, Offset: 06C20000, based on PE: false
                                  Similarity
                                  • API ID: Query_
                                  • String ID:
                                  • API String ID: 428220571-0
                                  • Opcode ID: 07c521444408513f7a3b91462ddb4121badb3832ef863b43355a7c6af3353573
                                  • Instruction ID: 24760ba469f0fc0490e1dd0397bb3b473e9066f7218469462e3168dbf4dcc0b5
                                  • Opcode Fuzzy Hash: 07c521444408513f7a3b91462ddb4121badb3832ef863b43355a7c6af3353573
                                  • Instruction Fuzzy Hash: 905125B1D002699FDF10CFA9C9847DEBBB5FF48704F248529E818A7250DB785945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031AFD0A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 732dcb194e106700011763a980f3d46ee14aa528206a7f228229d97dbbb483af
                                  • Instruction ID: 806cdc4ace0f6ec2b9ef307a141921cf36becac3c10e579d73d37b34c3bfe0b1
                                  • Opcode Fuzzy Hash: 732dcb194e106700011763a980f3d46ee14aa528206a7f228229d97dbbb483af
                                  • Instruction Fuzzy Hash: 7141C0B5D003499FDB14CF99C984ADEFBB5FF48314F24812AE819AB210D7759885CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031ABD87
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: affb5b4cd8044c5b28765f6a5b6d3ce2d891eaa41bfea071d4b63402e1fc4793
                                  • Instruction ID: a1f47e7f6d5d06aba3d1f6668387e80eb019fe2086bdcdc12801771acee54f85
                                  • Opcode Fuzzy Hash: affb5b4cd8044c5b28765f6a5b6d3ce2d891eaa41bfea071d4b63402e1fc4793
                                  • Instruction Fuzzy Hash: D02114B59002489FCB10CFA9D984ADEFFF8FB48324F15801AE918A3310D379A954CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031ABD87
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: d3cb8f96058d59b7aa89761392d57b1075788d0ac9494235deee6260876c058a
                                  • Instruction ID: 518a7f6d114ccf7c2027db70b0fa55719fe1842efed1714ff77fadd96ff58ca4
                                  • Opcode Fuzzy Hash: d3cb8f96058d59b7aa89761392d57b1075788d0ac9494235deee6260876c058a
                                  • Instruction Fuzzy Hash: 1721C4B59002499FDB10CF99D984ADEBFF8FB48324F15841AE918A7350D378A954CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031A96A9,00000800,00000000,00000000), ref: 031A98BA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 637b1d4de13f83101b8b6fe8213b8d552c3003ae69543e08220d408ce7a44991
                                  • Instruction ID: c9e4ac77ffb3fd8ad2358024972f8e90f8a3b263d5bb8cd98c27cdc2e2c5b672
                                  • Opcode Fuzzy Hash: 637b1d4de13f83101b8b6fe8213b8d552c3003ae69543e08220d408ce7a44991
                                  • Instruction Fuzzy Hash: 661117B6D006499FCB10CF9AC444ADEFBF8AB49320F05842ED519A7600C375A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031A96A9,00000800,00000000,00000000), ref: 031A98BA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: e9d74db38f0fd10524bc026fab13e53e6b3fe1f30bee01c986458c3288eb5267
                                  • Instruction ID: fa95c8c768ba67a73caddbf6c782a2b145e7fdb80956716c6cc1537040e26217
                                  • Opcode Fuzzy Hash: e9d74db38f0fd10524bc026fab13e53e6b3fe1f30bee01c986458c3288eb5267
                                  • Instruction Fuzzy Hash: AB1103B6D046498FCB10CF9AC544ADEFBF4EB48310F05842ED919B7600C779A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 031AFE9D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: 931372b79334d7a7ad1de42ad6e2904560e716e463fdb55a4b59ac14a95618fb
                                  • Instruction ID: 684dfa9d9784ce87d11e091911b096eabccc241c60bf4021beb5703a46d2678a
                                  • Opcode Fuzzy Hash: 931372b79334d7a7ad1de42ad6e2904560e716e463fdb55a4b59ac14a95618fb
                                  • Instruction Fuzzy Hash: 951128B5800649DFCB10CF99D984BDFFBF8EB48324F118419D914A7241C375A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 031A962E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: be90e970ed835ffa6a273eb6422d3992e7e882ca81907da41c0f6b1ad188f3ac
                                  • Instruction ID: f8536eb1e2ba5da77170a7802c677a22bb457167b23f43a45c2f2802118a86f4
                                  • Opcode Fuzzy Hash: be90e970ed835ffa6a273eb6422d3992e7e882ca81907da41c0f6b1ad188f3ac
                                  • Instruction Fuzzy Hash: F81110B6C006498FCB10CF9AC944BDEFBF4AF88224F15842AD829A7600D379A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 031AFE9D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.589838424.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: 505f9a05b21588e676c6ea96369931cadfbaf3c23df80851230093ace4fef99c
                                  • Instruction ID: dfe3b6dceb453908f88176131490a1fca5485b622f988aa50306988f45f23675
                                  • Opcode Fuzzy Hash: 505f9a05b21588e676c6ea96369931cadfbaf3c23df80851230093ace4fef99c
                                  • Instruction Fuzzy Hash: 0F1112B58002498FDB10CF99D984BDFFBF8EB48324F11841AD918A7341C378A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions

                                  Executed Functions

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 052F8128
                                  • GetCurrentThread.KERNEL32 ref: 052F8165
                                  • GetCurrentProcess.KERNEL32 ref: 052F81A2
                                  • GetCurrentThreadId.KERNEL32 ref: 052F81FB
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: e9ee4c8e1cc36dbb52beb03805ed2298e1109d3286ea75bff525d489a14496bb
                                  • Instruction ID: 6ae90749222d8b8e6b5e3c4f3792e949f4cc63e63b0d17008f85232e2dd344f6
                                  • Opcode Fuzzy Hash: e9ee4c8e1cc36dbb52beb03805ed2298e1109d3286ea75bff525d489a14496bb
                                  • Instruction Fuzzy Hash: 825154B09046498FDB10CFA9DA48BEEFBF1BF48314F208569E509A7291D7745848CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 052F8128
                                  • GetCurrentThread.KERNEL32 ref: 052F8165
                                  • GetCurrentProcess.KERNEL32 ref: 052F81A2
                                  • GetCurrentThreadId.KERNEL32 ref: 052F81FB
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: f7cd540e08aef619e5b631fea59ab077949e9245f6117271210d2247d505df15
                                  • Instruction ID: a2e19d21b3c5e763ab4e8b09d400dc4e083f9e8204246a68b64f5811cea999be
                                  • Opcode Fuzzy Hash: f7cd540e08aef619e5b631fea59ab077949e9245f6117271210d2247d505df15
                                  • Instruction Fuzzy Hash: E35144B09046498FDB10CFA9DA48BEEFBF4BF48314F208569E519A7290D7745848CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 052F5F02
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 4df216bc049cea0fb04c1fd2c9a599686fe4c3c174dc3c14a200d79224b13ca8
                                  • Instruction ID: d62ffe11720a9ddb8f8c1a7c2d12639485074e4bf8cf4eb795865e76046fcd4c
                                  • Opcode Fuzzy Hash: 4df216bc049cea0fb04c1fd2c9a599686fe4c3c174dc3c14a200d79224b13ca8
                                  • Instruction Fuzzy Hash: B391F270A11B099FDB24DF69E444BAAFBF1BF48304F10892AE54AE7B50D774A845CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 052FC639
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 09fc0e0382f30739ead9a25c195745f57856a504a64e9996ae1430d1887299d4
                                  • Instruction ID: cf031f668995464c3e3ae7964869c609e1af41fc77e354ff3d06c573b4b223cb
                                  • Opcode Fuzzy Hash: 09fc0e0382f30739ead9a25c195745f57856a504a64e9996ae1430d1887299d4
                                  • Instruction Fuzzy Hash: 5D7189B4D042189FDF20CFA9D984BDEBBB1BF49304F1491AAE908B7211D770AA85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 052FC639
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: b9deb4deada77427968784c54c1625705dba343a2ba9a14b727ea0debb212826
                                  • Instruction ID: 6795797acea6c728f6fff8c88172d7a10974f09adae67adb226f58b632248101
                                  • Opcode Fuzzy Hash: b9deb4deada77427968784c54c1625705dba343a2ba9a14b727ea0debb212826
                                  • Instruction Fuzzy Hash: D07178B4D142189FCF20CFA9D984BDDBBB1BF49304F10A1AAE908B7211D770AA85CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 052F1CF1
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 051be0a425882adef00a0093e8951d7697b2605346f1d8863f57edfa7dbe43e5
                                  • Instruction ID: 62b6b60d7936267e0be933d9eb3059f7065bc3e797e98063508cc335ef0a0d36
                                  • Opcode Fuzzy Hash: 051be0a425882adef00a0093e8951d7697b2605346f1d8863f57edfa7dbe43e5
                                  • Instruction Fuzzy Hash: 2451E5B1D1461CCFDB20CFA8C880BCEBBB5BF49304F5084A9D509AB250DB756A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 052F1CF1
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 70c0218459600bfc4bd27d8b9af222a84e90fd7bd83d201dad73cdb58b8f76d6
                                  • Instruction ID: a3c70af7ab0ab8fa2b166ae23a3cccdced23f020fc53300d576f8907e43e0233
                                  • Opcode Fuzzy Hash: 70c0218459600bfc4bd27d8b9af222a84e90fd7bd83d201dad73cdb58b8f76d6
                                  • Instruction Fuzzy Hash: B251F671D14618CFDB20CFA8C880BCEBBB5BF49304F1085AAD509AB250DB756A89CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 052F83BB
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: c8e9161f5ebde279bf1662a94b2314076c36a95adaa8715815420afee6cc29fe
                                  • Instruction ID: 956031870b392e63e14b72c64f3671e8187c21e87e707fb5833bc2cc7e067021
                                  • Opcode Fuzzy Hash: c8e9161f5ebde279bf1662a94b2314076c36a95adaa8715815420afee6cc29fe
                                  • Instruction Fuzzy Hash: 3F4164B9D042589FCB00CFA9D984AEEFBF4BF49310F15902AE918AB210D375A945CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 052F83BB
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 7e929c0142d2688ed5f536c10cafa31598a7f47af656d987d602cda460dc86c0
                                  • Instruction ID: 7a3d4c7e689f73a8d1d690c697a8317147b42f4ffaee2086837785366e89bb1c
                                  • Opcode Fuzzy Hash: 7e929c0142d2688ed5f536c10cafa31598a7f47af656d987d602cda460dc86c0
                                  • Instruction Fuzzy Hash: 844163B9D042589FCB00CFA9D984ADEFBF4BF09310F15902AE918AB310D375A945CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 052F622A
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 5e3e62945a66be21a24e575c29368146ccdaee57f9f8fb37f53494bd1494b0a2
                                  • Instruction ID: 3a0b29a579426ae6ee13c3dcf6f49c19e1229f26f109219686dfc4ebbbd400a0
                                  • Opcode Fuzzy Hash: 5e3e62945a66be21a24e575c29368146ccdaee57f9f8fb37f53494bd1494b0a2
                                  • Instruction Fuzzy Hash: 3A4185B4D042589FCB10CFA9E884A9EFBF5FB49310F14902AE918BB310D774A946CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 052FF0A1
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: b9c0909e651c07c2310bf70ad72970814afcbd8c3290b4b68325c88a1f349e9d
                                  • Instruction ID: e72675493757e7ea674dd2077f5f394b068ef8a4fc9bfeae69951b06005c8a3b
                                  • Opcode Fuzzy Hash: b9c0909e651c07c2310bf70ad72970814afcbd8c3290b4b68325c88a1f349e9d
                                  • Instruction Fuzzy Hash: E24158B4A102458FCB10CF99D588AAAFBF5FF88314F25C59CE619A7321D775A841CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(?,?,?), ref: 052F622A
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 42ee0ff375a65fd657c67ff36a5b0f5e14c679c375bb0c63351cfd2180a63d4d
                                  • Instruction ID: efa7b3f2ebf792aee5c5a6654cba8c20420842221ebe6080a8af8e0134e56213
                                  • Opcode Fuzzy Hash: 42ee0ff375a65fd657c67ff36a5b0f5e14c679c375bb0c63351cfd2180a63d4d
                                  • Instruction Fuzzy Hash: 484166B4D042599FCB10CFA9E484A9EFBF1BF49310F14902AE918B7210D775A945CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(?), ref: 052F5F02
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.313988877.00000000052F0000.00000040.00000001.sdmp, Offset: 052F0000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: f313437f7b8ae28f90a3a31459aa2030e6903217389904eec894c3d275fcdd4c
                                  • Instruction ID: a11cd4edd5643aa6ef2389aa44069d95794fa4c2da8ba457852178d1e4950203
                                  • Opcode Fuzzy Hash: f313437f7b8ae28f90a3a31459aa2030e6903217389904eec894c3d275fcdd4c
                                  • Instruction Fuzzy Hash: C931B7B4E142099FCB10CFA9E484ADEFBF5AF49310F14906AE818B7310D374A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions