Loading ...

Play interactive tourEdit tour

Analysis Report PO#4018-308875.exe

Overview

General Information

Sample Name:PO#4018-308875.exe
Analysis ID:342477
MD5:26b17b353c8950ca0a55e1ea21678d9e
SHA1:c5f2e80f53a312bd1b8dd3bba438af27a4ba44e3
SHA256:43bdef53f8ff0d262c2086a46c66d76f8c5e2b9df085959c70a5a3c679474767
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains very large array initializations
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • PO#4018-308875.exe (PID: 5652 cmdline: 'C:\Users\user\Desktop\PO#4018-308875.exe' MD5: 26B17B353C8950CA0A55E1EA21678D9E)
    • cmd.exe (PID: 4564 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 2764 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • hjfufkimd.exe (PID: 4408 cmdline: 'C:\Users\user\AppData\Roaming\hjfufkimd.exe' MD5: 26B17B353C8950CA0A55E1EA21678D9E)
      • InstallUtil.exe (PID: 7088 cmdline: C:\Users\user~1\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xdb8ef:$x1: NanoCore.ClientPluginHost
  • 0x10e4bf:$x1: NanoCore.ClientPluginHost
  • 0x14107f:$x1: NanoCore.ClientPluginHost
  • 0xdb92c:$x2: IClientNetworkHost
  • 0x10e4fc:$x2: IClientNetworkHost
  • 0x1410bc:$x2: IClientNetworkHost
  • 0xdf45f:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x11202f:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x144bef:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xdb657:$a: NanoCore
    • 0xdb667:$a: NanoCore
    • 0xdb89b:$a: NanoCore
    • 0xdb8af:$a: NanoCore
    • 0xdb8ef:$a: NanoCore
    • 0x10e227:$a: NanoCore
    • 0x10e237:$a: NanoCore
    • 0x10e46b:$a: NanoCore
    • 0x10e47f:$a: NanoCore
    • 0x10e4bf:$a: NanoCore
    • 0x140de7:$a: NanoCore
    • 0x140df7:$a: NanoCore
    • 0x14102b:$a: NanoCore
    • 0x14103f:$a: NanoCore
    • 0x14107f:$a: NanoCore
    • 0xdb6b6:$b: ClientPlugin
    • 0xdb8b8:$b: ClientPlugin
    • 0xdb8f8:$b: ClientPlugin
    • 0x10e286:$b: ClientPlugin
    • 0x10e488:$b: ClientPlugin
    • 0x10e4c8:$b: ClientPlugin
    0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 23 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    26.2.InstallUtil.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    26.2.InstallUtil.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    26.2.InstallUtil.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      26.2.InstallUtil.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      26.2.InstallUtil.exe.5620000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      Click to see the 7 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 7088, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: InstallUtil.exe.7088.26.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORY
      Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPE
      Source: 26.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 26.2.InstallUtil.exe.5f00000.5.unpackAvira: Label: TR/NanoCore.fadte

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: PO#4018-308875.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: PO#4018-308875.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO#4018-308875.exe, 00000000.00000003.315746155.0000000008151000.00000004.00000001.sdmp, InstallUtil.exe, 0000001A.00000000.418639038.00000000009B2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: PO#4018-308875.exe, 00000000.00000003.315746155.0000000008151000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov esp, ebp0_2_078CE638
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_078CD018
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_078C5FA0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_078C6CE0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_078C6CE0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_078C7B58
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_078CFA40
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_078C69C0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_078C69C0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then jmp 078C2026h0_2_078C1851
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_078C64DC
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_078C6CD4
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_078C6CD4
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then xor edx, edx0_2_078C6C0C
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then xor edx, edx0_2_078C6C18
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_078C7C38
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_078C69B4
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_078C69B4
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then push dword ptr [ebp-24h]20_2_056F6CE0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh20_2_056F6CE0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h20_2_056F5FA0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h20_2_056FCEF8
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then push dword ptr [ebp-20h]20_2_056F69C0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh20_2_056F69C0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then jmp 056F2026h20_2_056F1860
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h20_2_056F7B58
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h20_2_056F64DC
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h20_2_056F7C38
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then xor edx, edx20_2_056F6C0C
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then xor edx, edx20_2_056F6C18
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then push dword ptr [ebp-24h]20_2_056F6CD4
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh20_2_056F6CD4
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h20_2_056FCEE7
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then push dword ptr [ebp-20h]20_2_056F69B4
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh20_2_056F69B4
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 4x nop then jmp 056F2026h20_2_056F1851

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 185.162.88.26
      Source: Malware configuration extractorIPs: 185.162.88.26:2091
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: fenixalec.ddns.net
      Source: global trafficTCP traffic: 192.168.2.7:49749 -> 185.162.88.26:20911
      Source: Joe Sandbox ViewIP Address: 185.162.88.26 185.162.88.26
      Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
      Source: unknownDNS traffic detected: queries for: fenixalec.ddns.net
      Source: hjfufkimd.exe, 00000014.00000002.626448750.00000000016C9000.00000004.00000040.sdmpString found in binary or memory: http://iptc.tc4xmp
      Source: PO#4018-308875.exe, 00000000.00000003.337497700.00000000015A9000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/Ident
      Source: PO#4018-308875.exe, 00000000.00000002.338223663.00000000010E8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: InstallUtil.exe, 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORY
      Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 26.2.InstallUtil.exe.5620000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      .NET source code contains very large array initializationsShow sources
      Source: PO#4018-308875.exe, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Source: hjfufkimd.exe.0.dr, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Source: 0.2.PO#4018-308875.exe.9f0000.0.unpack, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Source: 0.0.PO#4018-308875.exe.9f0000.0.unpack, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Source: 20.2.hjfufkimd.exe.b70000.0.unpack, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Source: 20.0.hjfufkimd.exe.b70000.0.unpack, i7H/Er0.csLarge array initialization: .cctor: array initializer size 2491
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: PO#4018-308875.exe
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A50D8 CreateProcessAsUserW,20_2_056A50D8
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010CC0600_2_010CC060
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010C55580_2_010C5558
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010CB5680_2_010CB568
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010C8C700_2_010C8C70
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010CD7900_2_010CD790
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010CAFC00_2_010CAFC0
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078CD5980_2_078CD598
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C00400_2_078C0040
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C20500_2_078C2050
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C7E300_2_078C7E30
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C18510_2_078C1851
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078CD5880_2_078CD588
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C748B0_2_078C748B
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C74980_2_078C7498
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078CE0A90_2_078CE0A9
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C00070_2_078C0007
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_078C20400_2_078C2040
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_016819C020_2_016819C0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168C07020_2_0168C070
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168B57820_2_0168B578
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168555820_2_01685558
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_01688C7020_2_01688C70
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_01685CC020_2_01685CC0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168D7A020_2_0168D7A0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168C06020_2_0168C060
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168B56820_2_0168B568
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168AFC020_2_0168AFC0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_0168D79020_2_0168D790
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A6D2820_2_056A6D28
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A004020_2_056A0040
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A408920_2_056A4089
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A1B0020_2_056A1B00
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A223020_2_056A2230
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A795820_2_056A7958
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A380020_2_056A3800
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A000620_2_056A0006
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A381020_2_056A3810
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A4B2020_2_056A4B20
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A5BE020_2_056A5BE0
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A338820_2_056A3388
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A339820_2_056A3398
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A222020_2_056A2220
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056A1AF120_2_056A1AF1
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056FF66820_2_056FF668
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056FD14020_2_056FD140
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F004020_2_056F0040
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F205020_2_056F2050
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056FEC8020_2_056FEC80
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F7E5020_2_056F7E50
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F186020_2_056F1860
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F748920_2_056F7489
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F749820_2_056F7498
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056FD13020_2_056FD130
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F204020_2_056F2040
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F002220_2_056F0022
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F7E3020_2_056F7E30
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_056F185120_2_056F1851
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_009B20B026_2_009B20B0
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_02DBE48026_2_02DBE480
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_02DBE47126_2_02DBE471
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_02DBBBD426_2_02DBBBD4
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_0549655026_2_05496550
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_0549F42826_2_0549F428
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_0549C67026_2_0549C670
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_05493E3026_2_05493E30
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_0549BA5826_2_0549BA58
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_05494A5026_2_05494A50
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_0549C72E26_2_0549C72E
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 26_2_05494B0826_2_05494B08
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
      Source: PO#4018-308875.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: PO#4018-308875.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: PO#4018-308875.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: hjfufkimd.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: hjfufkimd.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: hjfufkimd.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: PO#4018-308875.exe, 00000000.00000002.344330242.00000000054E0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000002.344330242.00000000054E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000003.315746155.0000000008151000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInstallUtil.exeT vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000002.344104285.00000000053D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000002.338938017.0000000003E61000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000002.338223663.00000000010E8000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO#4018-308875.exe
      Source: PO#4018-308875.exe, 00000000.00000002.344553868.0000000005AB0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO#4018-308875.exe
      Source: PO#4018-308875.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
      Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 26.2.InstallUtil.exe.5620000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 26.2.InstallUtil.exe.5620000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@9/2
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Roaming\hjfufkimd.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4c844ad7-de78-4c04-815b-d468ebb89811}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4496:120:WilError_01
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user~1\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: PO#4018-308875.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO#4018-308875.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile read: C:\Users\user\Desktop\PO#4018-308875.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO#4018-308875.exe 'C:\Users\user\Desktop\PO#4018-308875.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\hjfufkimd.exe 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user~1\AppData\Local\Temp\InstallUtil.exe
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Users\user\AppData\Roaming\hjfufkimd.exe 'C:\Users\user\AppData\Roaming\hjfufkimd.exe' Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user~1\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: PO#4018-308875.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: PO#4018-308875.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO#4018-308875.exe, 00000000.00000003.315746155.0000000008151000.00000004.00000001.sdmp, InstallUtil.exe, 0000001A.00000000.418639038.00000000009B2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: PO#4018-308875.exe, 00000000.00000003.315746155.0000000008151000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr
      Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_010C16D7 pushad ; iretd 0_2_010C16E1
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeCode function: 20_2_016816D7 pushad ; iretd 20_2_016816E1
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Roaming\hjfufkimd.exeJump to dropped file
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run erwtvsfvcJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run erwtvsfvcJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened: C:\Users\user\Desktop\PO#4018-308875.exe\:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeFile opened: C:\Users\user\AppData\Roaming\hjfufkimd.exe\:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeWindow / User API: threadDelayed 3017Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeWindow / User API: threadDelayed 6785Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeWindow / User API: threadDelayed 2007Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeWindow / User API: threadDelayed 7810Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 1711Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 7876Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 716Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 2324Thread sleep time: -18446744073709540s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 2324Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 5428Thread sleep count: 3017 > 30Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 5428Thread sleep count: 6785 > 30Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 2324Thread sleep count: 37 > 30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exe TID: 6212Thread sleep time: -21213755684765971s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exe TID: 6212Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exe TID: 5836Thread sleep count: 2007 > 30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exe TID: 5836Thread sleep count: 7810 > 30Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 1400Thread sleep time: -14757395258967632s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmware svga
      Source: PO#4018-308875.exe, 00000000.00000002.344104285.00000000053D0000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.633192284.00000000067C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: PO#4018-308875.exe, 00000000.00000002.338938017.0000000003E61000.00000004.00000001.sdmp, hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
      Source: PO#4018-308875.exe, 00000000.00000002.338938017.0000000003E61000.00000004.00000001.sdmp, hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
      Source: PO#4018-308875.exe, 00000000.00000002.338938017.0000000003E61000.00000004.00000001.sdmp, hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmusrvc
      Source: PO#4018-308875.exe, 00000000.00000002.346318375.000000000814E000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\(
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmsrvc
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmtools
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
      Source: PO#4018-308875.exe, 00000000.00000002.346318375.000000000814E000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Re
      Source: PO#4018-308875.exe, 00000000.00000002.344104285.00000000053D0000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.633192284.00000000067C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: PO#4018-308875.exe, 00000000.00000002.344104285.00000000053D0000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.633192284.00000000067C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: hjfufkimd.exe, 00000014.00000002.634749028.0000000005660000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
      Source: PO#4018-308875.exe, 00000000.00000002.344104285.00000000053D0000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.633192284.00000000067C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 402000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 422000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: BCD008Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'Jump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Users\user\AppData\Roaming\hjfufkimd.exe 'C:\Users\user\AppData\Roaming\hjfufkimd.exe' Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'Jump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user~1\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: hjfufkimd.exe, 00000014.00000002.626496174.0000000001A60000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.627042256.00000000018A0000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
      Source: InstallUtil.exe, 0000001A.00000002.633150230.00000000063FD000.00000004.00000001.sdmpBinary or memory string: Program Managerd
      Source: InstallUtil.exe, 0000001A.00000002.630050024.0000000003230000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: hjfufkimd.exe, 00000014.00000002.626496174.0000000001A60000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.627042256.00000000018A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: hjfufkimd.exe, 00000014.00000002.626496174.0000000001A60000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.627042256.00000000018A0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: InstallUtil.exe, 0000001A.00000002.633182323.000000000667E000.00000004.00000001.sdmpBinary or memory string: Program Manager0
      Source: InstallUtil.exe, 0000001A.00000002.633062767.000000000606D000.00000004.00000001.sdmpBinary or memory string: Program Managerdy(
      Source: hjfufkimd.exe, 00000014.00000002.626496174.0000000001A60000.00000002.00000001.sdmp, InstallUtil.exe, 0000001A.00000002.627042256.00000000018A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Users\user\Desktop\PO#4018-308875.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeQueries volume information: C:\Users\user\AppData\Roaming\hjfufkimd.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\hjfufkimd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\PO#4018-308875.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORY
      Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: PO#4018-308875.exe, 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: hjfufkimd.exe, 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 5652, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: hjfufkimd.exe PID: 4408, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7088, type: MEMORY
      Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 26.2.InstallUtil.exe.5f00000.5.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Masquerading1Input Capture21Query Registry1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation1Valid Accounts1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection312Modify Registry1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Access Token Manipulation1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion3LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonDisable or Modify Tools1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Obfuscated Files or Information2/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Software Packing1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      26.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      26.2.InstallUtil.exe.5f00000.5.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      SourceDetectionScannerLabelLink
      fenixalec.ddns.net4%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      http://ns.ado/Ident0%Avira URL Cloudsafe
      http://iptc.tc4xmp0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      fenixalec.ddns.net
      185.162.88.26
      truetrueunknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://ns.ado/IdentPO#4018-308875.exe, 00000000.00000003.337497700.00000000015A9000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://iptc.tc4xmphjfufkimd.exe, 00000014.00000002.626448750.00000000016C9000.00000004.00000040.sdmpfalse
      • Avira URL Cloud: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      185.162.88.26:2091
      unknownunknown
      unknownunknowntrue
      185.162.88.26
      unknownNetherlands
      40676AS40676UStrue

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:342477
      Start date:21.01.2021
      Start time:07:18:42
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 11m 32s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:PO#4018-308875.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:31
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@10/5@9/2
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 2% (good quality ratio 1.9%)
      • Quality average: 49.5%
      • Quality standard deviation: 23.9%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 79
      • Number of non-executed functions: 6
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 104.43.139.144, 104.42.151.234, 2.20.84.85, 51.11.168.160, 92.122.213.194, 92.122.213.247, 51.103.5.186, 205.185.216.10, 205.185.216.42, 52.155.217.156, 20.54.26.129, 51.104.139.180
      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      07:19:43API Interceptor188x Sleep call for process: PO#4018-308875.exe modified
      07:19:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run erwtvsfvc C:\Users\user\AppData\Roaming\hjfufkimd.exe
      07:19:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run erwtvsfvc C:\Users\user\AppData\Roaming\hjfufkimd.exe
      07:20:30API Interceptor204x Sleep call for process: hjfufkimd.exe modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      185.162.88.26PO#4018-308875.pdf.exeGet hashmaliciousBrowse
        MEDUSI492126.pdf.exeGet hashmaliciousBrowse
          silkOrder00110.pdf.exeGet hashmaliciousBrowse
            Order_BC012356.pdf.exeGet hashmaliciousBrowse
              Document#20014464370.pdf.exeGet hashmaliciousBrowse

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                fenixalec.ddns.netPO#4018-308875.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                silkOrder00110.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Order_BC012356.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Document#20014464370.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                AS40676USPO#4018-308875.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Ulma9B5jo1.exeGet hashmaliciousBrowse
                • 104.149.57.92
                MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Request for Quotation.exeGet hashmaliciousBrowse
                • 45.34.249.53
                silkOrder00110.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Order_BC012356.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                Document#20014464370.pdf.exeGet hashmaliciousBrowse
                • 185.162.88.26
                t1XJOlYvhExZyrm.exeGet hashmaliciousBrowse
                • 104.225.208.15
                SWIFT_COPY00993Payment_advic4555pdf.exeGet hashmaliciousBrowse
                • 172.106.111.244
                QN08qH1zYv.exeGet hashmaliciousBrowse
                • 104.149.57.92
                SWIFT-COPY Payment advice3243343.exeGet hashmaliciousBrowse
                • 172.106.111.244
                catalogo TAWI group.exeGet hashmaliciousBrowse
                • 107.160.127.252
                Rfq 214871_TAWI Catalog.exeGet hashmaliciousBrowse
                • 107.160.127.252
                Rfq_Catalog.exeGet hashmaliciousBrowse
                • 107.160.127.252
                NPD76122.exeGet hashmaliciousBrowse
                • 104.217.231.247
                h3dFAROdF3.exeGet hashmaliciousBrowse
                • 104.217.231.248
                d2mISAbTQN.exeGet hashmaliciousBrowse
                • 104.217.231.248
                n41pVXkYCe.exeGet hashmaliciousBrowse
                • 104.217.231.248
                kqwqyoFz1C.exeGet hashmaliciousBrowse
                • 104.217.231.248
                53McmgaUJP.exeGet hashmaliciousBrowse
                • 104.217.231.248

                JA3 Fingerprints

                No context

                Dropped Files

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                C:\Users\user\AppData\Local\Temp\InstallUtil.exeIMG_57880.pdf.exeGet hashmaliciousBrowse
                  PO 67542 PDF.exeGet hashmaliciousBrowse
                    Mi9eI6wu1p.exeGet hashmaliciousBrowse
                      OJ4zX7G77Y.exeGet hashmaliciousBrowse
                        IMG_50781.pdf.exeGet hashmaliciousBrowse
                          IMG_25579.pdf.exeGet hashmaliciousBrowse
                            IMG_40317.pdf.exeGet hashmaliciousBrowse
                              PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                SecuriteInfo.com.Trojan.PackedNET.509.8504.exeGet hashmaliciousBrowse
                                  IMG_80137.pdf.exeGet hashmaliciousBrowse
                                    Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                      MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                                        2GNCGUZ6JU.exeGet hashmaliciousBrowse
                                          IMG_53771.pdf.exeGet hashmaliciousBrowse
                                            SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exeGet hashmaliciousBrowse
                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                                silkOrder00110.pdf.exeGet hashmaliciousBrowse
                                                  74725794.exeGet hashmaliciousBrowse
                                                    74725794.exeGet hashmaliciousBrowse
                                                      IMG_53091.pdf.exeGet hashmaliciousBrowse

                                                        Created / dropped Files

                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#4018-308875.exe.log
                                                        Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):1451
                                                        Entropy (8bit):5.345862727722058
                                                        Encrypted:false
                                                        SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84G1qE4j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovGm
                                                        MD5:06F54CDBFEF62849AF5AE052722BD7B6
                                                        SHA1:FB0250AAC2057D0B5BCE4CE130891E428F28DA05
                                                        SHA-256:4C039B93A728B546F49C47ED8B448D40A3553CDAABB147067AEE3958133CB446
                                                        SHA-512:34EF5F6D5EAB0E5B11AC81F0D72FC56304291EDEEF6D19DF7145FDECAB5D342767DBBC0B4384B8DECB5741E6B85A4B431DF14FBEB5DDF2DEE103064D2895EABB
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                        C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                        Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):41064
                                                        Entropy (8bit):6.164873449128079
                                                        Encrypted:false
                                                        SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                        MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                        SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                        SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                        SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: IMG_57880.pdf.exe, Detection: malicious, Browse
                                                        • Filename: PO 67542 PDF.exe, Detection: malicious, Browse
                                                        • Filename: Mi9eI6wu1p.exe, Detection: malicious, Browse
                                                        • Filename: OJ4zX7G77Y.exe, Detection: malicious, Browse
                                                        • Filename: IMG_50781.pdf.exe, Detection: malicious, Browse
                                                        • Filename: IMG_25579.pdf.exe, Detection: malicious, Browse
                                                        • Filename: IMG_40317.pdf.exe, Detection: malicious, Browse
                                                        • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.PackedNET.509.8504.exe, Detection: malicious, Browse
                                                        • Filename: IMG_80137.pdf.exe, Detection: malicious, Browse
                                                        • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                        • Filename: MEDUSI492126.pdf.exe, Detection: malicious, Browse
                                                        • Filename: 2GNCGUZ6JU.exe, Detection: malicious, Browse
                                                        • Filename: IMG_53771.pdf.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exe, Detection: malicious, Browse
                                                        • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                        • Filename: silkOrder00110.pdf.exe, Detection: malicious, Browse
                                                        • Filename: 74725794.exe, Detection: malicious, Browse
                                                        • Filename: 74725794.exe, Detection: malicious, Browse
                                                        • Filename: IMG_53091.pdf.exe, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                        Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                        File Type:ISO-8859 text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):8
                                                        Entropy (8bit):3.0
                                                        Encrypted:false
                                                        SSDEEP:3:R:R
                                                        MD5:2F1BE7A93FA3932139F44045B7093C9D
                                                        SHA1:3BD21ABDB1D8DF0DB4FB6584AE3E957B4BC09F36
                                                        SHA-256:FC8D923CBCB211095CFD934D23AA52DD05FDD272545BD4CB488D15A186BAA53D
                                                        SHA-512:530C64B9C169A53F0721317D1D7AE338C75EED8A6925D512172198875DD3DFF63CE9DB5FECB29685B773E29589DF3AB2FE44D2D035A7539EBFE67CA3DA0680A4
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview: ..&- ..H
                                                        C:\Users\user\AppData\Roaming\hjfufkimd.exe
                                                        Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):716800
                                                        Entropy (8bit):5.544271789349581
                                                        Encrypted:false
                                                        SSDEEP:12288:jJ050jwcEc6t4HpTkJ23d9ZSn9Vt6DuUx:ji08cEc6t4HpAIZSnb
                                                        MD5:26B17B353C8950CA0A55E1EA21678D9E
                                                        SHA1:C5F2E80F53A312BD1B8DD3BBA438AF27A4BA44E3
                                                        SHA-256:43BDEF53F8FF0D262C2086A46C66D76F8C5E2B9DF085959C70A5A3C679474767
                                                        SHA-512:B90A04A218AE54201A4AB25848C91DC197C829C90BEB4DE4B8CC5F9F54928A962151129796181B9DBF48DA1BE6BB7294F878E3BDF020373B9DF2C8A759E8BE23
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..G.................~...p......^.... ........@.. .......................@............`.....................................S........l................... ....................................................... ............... ..H............text...d|... ...~.................. ..`.rsrc....l.......n..................@..@.reloc....... ......................@..B................@.......H........`..0;......<....*...6.............................................w............%.v..y.....d..:....m....Q.......4..W.....F..s.n..y!sv.g..+'....=6.S...^..g.L..z...G|;g|@.R....Nj..2hLX.^s....Z.[G.4......c..4.b..../.z+..X.%.....K....[...D.?Iq.#."..=...3.-..k.P...^..;.+...6..j..ig.....-...E1.*Z.0.e...4........J.G..C.C...1..h...I..N>.U]}..T6jZ...Dq.yDY.y..8.....M.2.Jia&..C\...q...q..t...u$.]N....V.\....U.V....R.._.}N.a....c....h}.J/N..J.i..-`j.SL.....(6.._....
                                                        C:\Users\user\AppData\Roaming\hjfufkimd.exe:Zone.Identifier
                                                        Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:true
                                                        Reputation:high, very likely benign file
                                                        Preview: [ZoneTransfer]....ZoneId=0

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):5.544271789349581
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Windows Screen Saver (13104/52) 0.07%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        File name:PO#4018-308875.exe
                                                        File size:716800
                                                        MD5:26b17b353c8950ca0a55e1ea21678d9e
                                                        SHA1:c5f2e80f53a312bd1b8dd3bba438af27a4ba44e3
                                                        SHA256:43bdef53f8ff0d262c2086a46c66d76f8c5e2b9df085959c70a5a3c679474767
                                                        SHA512:b90a04a218ae54201a4ab25848c91dc197c829c90beb4de4b8cc5f9f54928a962151129796181b9dbf48da1be6bb7294f878e3bdf020373b9df2c8a759e8be23
                                                        SSDEEP:12288:jJ050jwcEc6t4HpTkJ23d9ZSn9Vt6DuUx:ji08cEc6t4HpAIZSnb
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..G.................~...p......^.... ........@.. .......................@............`................................

                                                        File Icon

                                                        Icon Hash:6862eee6b292c66e

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x4a9c5e
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                        Time Stamp:0x471CEA6D [Mon Oct 22 18:22:37 2007 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:v4.0.30319
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                        Entrypoint Preview

                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa9c080x53.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x6c0e.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xa7c640xa7e00False0.528291953649data5.50950484926IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xaa0000x6c0e0x6e00False0.521803977273data5.77182057685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xb20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_ICON0xaa2c40x668data
                                                        RT_ICON0xaa92c0x2e8data
                                                        RT_ICON0xaac140x128GLS_BINARY_LSB_FIRST
                                                        RT_ICON0xaad3c0xea8data
                                                        RT_ICON0xabbe40x8a8data
                                                        RT_ICON0xac48c0x568GLS_BINARY_LSB_FIRST
                                                        RT_ICON0xac9f40x25a8data
                                                        RT_ICON0xaef9c0x10a8data
                                                        RT_ICON0xb00440x468GLS_BINARY_LSB_FIRST
                                                        RT_GROUP_ICON0xb04ac0x84data
                                                        RT_VERSION0xb05300x4f4dataEnglishUnited States
                                                        RT_MANIFEST0xb0a240x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                        Imports

                                                        DLLImport
                                                        mscoree.dll_CorExeMain

                                                        Version Infos

                                                        DescriptionData
                                                        LegalCopyright(c) Nota Inc. All rights reserved.
                                                        FileVersion4.1.4.0
                                                        CompanyNameNota Inc.
                                                        CommentsThis installation was built with Inno Setup.
                                                        ProductNameGyazo
                                                        ProductVersion4.1.4.0
                                                        FileDescriptionGyazo Setup
                                                        Translation0x0000 0x04b0

                                                        Possible Origin

                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States

                                                        Network Behavior

                                                        Network Port Distribution

                                                        TCP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 21, 2021 07:21:10.194595098 CET4974920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:10.245362997 CET2091149749185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:10.750391960 CET4974920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:10.800987005 CET2091149749185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:11.312966108 CET4974920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:11.363570929 CET2091149749185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:15.517932892 CET4975020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:15.568631887 CET2091149750185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:16.079057932 CET4975020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:16.129749060 CET2091149750185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:16.641479969 CET4975020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:16.692219973 CET2091149750185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:20.705828905 CET4975120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:20.756248951 CET2091149751185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:21.267081976 CET4975120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:21.317872047 CET2091149751185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:21.829600096 CET4975120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:21.880040884 CET2091149751185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:26.059458971 CET4975320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:26.110008955 CET2091149753185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:26.611205101 CET4975320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:26.661964893 CET2091149753185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:27.174010992 CET4975320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:27.224834919 CET2091149753185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:31.299650908 CET4975520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:31.350349903 CET2091149755185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:31.861526012 CET4975520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:31.913264036 CET2091149755185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:32.424514055 CET4975520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:32.475508928 CET2091149755185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:36.555077076 CET4975620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:36.605745077 CET2091149756185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:37.112006903 CET4975620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:37.162477016 CET2091149756185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:37.674544096 CET4975620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:37.725790977 CET2091149756185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:41.746510983 CET4975720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:41.797168016 CET2091149757185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:42.299890041 CET4975720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:42.350419998 CET2091149757185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:42.862423897 CET4975720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:42.913009882 CET2091149757185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:46.928580999 CET4975820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:46.980833054 CET2091149758185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:47.487807035 CET4975820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:47.538381100 CET2091149758185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:48.050369978 CET4975820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:48.101048946 CET2091149758185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:52.114620924 CET4975920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:52.165218115 CET2091149759185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:52.675843954 CET4975920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:52.726166010 CET2091149759185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:53.238327026 CET4975920911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:53.288965940 CET2091149759185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:57.469202995 CET4976020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:57.520087004 CET2091149760185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:58.035609961 CET4976020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:58.086205959 CET2091149760185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:21:58.598628998 CET4976020911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:21:58.649328947 CET2091149760185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:02.790209055 CET4976120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:02.840651989 CET2091149761185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:03.350677967 CET4976120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:03.401880980 CET2091149761185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:03.910955906 CET4976120911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:03.961889982 CET2091149761185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:09.391566992 CET4976220911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:09.442047119 CET2091149762185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:09.952791929 CET4976220911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:10.004659891 CET2091149762185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:10.506259918 CET4976220911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:10.556945086 CET2091149762185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:14.601311922 CET4976320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:14.652283907 CET2091149763185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:15.162935019 CET4976320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:15.215492964 CET2091149763185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:15.725584984 CET4976320911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:15.777245045 CET2091149763185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:19.805321932 CET4976420911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:19.856096029 CET2091149764185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:20.366501093 CET4976420911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:20.417002916 CET2091149764185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:20.928977966 CET4976420911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:20.979587078 CET2091149764185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:25.120189905 CET4976520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:25.170635939 CET2091149765185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:25.679419041 CET4976520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:25.730566978 CET2091149765185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:26.241952896 CET4976520911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:26.292938948 CET2091149765185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:30.421901941 CET4976620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:30.472906113 CET2091149766185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:30.976934910 CET4976620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:31.027550936 CET2091149766185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:31.539257050 CET4976620911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:31.589936972 CET2091149766185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:35.667542934 CET4976720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:35.718305111 CET2091149767185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:36.227289915 CET4976720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:36.277928114 CET2091149767185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:36.789805889 CET4976720911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:36.840408087 CET2091149767185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:40.910835028 CET4976820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:40.961294889 CET2091149768185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:41.461968899 CET4976820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:41.512542963 CET2091149768185.162.88.26192.168.2.7
                                                        Jan 21, 2021 07:22:42.024513960 CET4976820911192.168.2.7185.162.88.26
                                                        Jan 21, 2021 07:22:42.075789928 CET2091149768185.162.88.26192.168.2.7

                                                        UDP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 21, 2021 07:19:39.187886953 CET5541153192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:39.244185925 CET53554118.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:40.364118099 CET6366853192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:40.414766073 CET53636688.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:41.766908884 CET5464053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:41.817589045 CET53546408.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:42.781416893 CET5873953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:42.829230070 CET53587398.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:44.003678083 CET6033853192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:44.054332018 CET53603388.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:44.998965025 CET5871753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:45.058206081 CET53587178.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:46.099541903 CET5976253192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:46.147551060 CET53597628.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:47.129146099 CET5432953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:47.176958084 CET53543298.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:48.157058001 CET5805253192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:48.207770109 CET53580528.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:49.116137028 CET5400853192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:49.174880028 CET53540088.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:49.974899054 CET5945153192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:50.031143904 CET53594518.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:50.726120949 CET5291453192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:50.782291889 CET53529148.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:51.991139889 CET6456953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:52.041958094 CET53645698.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:54.407627106 CET5281653192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:54.466856003 CET53528168.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:55.777554035 CET5078153192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:55.825472116 CET53507818.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:56.764731884 CET5423053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:56.820934057 CET53542308.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:58.272994041 CET5491153192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:58.324692011 CET53549118.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:19:59.522815943 CET4995853192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:19:59.581321001 CET53499588.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:01.119352102 CET5086053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:01.167102098 CET53508608.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:02.199868917 CET5045253192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:02.250752926 CET53504528.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:02.385554075 CET5973053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:02.436297894 CET53597308.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:07.982062101 CET5931053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:08.038496971 CET53593108.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:18.294717073 CET5191953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:18.345320940 CET53519198.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:18.652225971 CET6429653192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:18.703476906 CET53642968.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:23.751013041 CET5668053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:23.807271004 CET53566808.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:29.860162020 CET5882053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:29.919303894 CET53588208.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:30.506624937 CET6098353192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:30.563065052 CET53609838.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:31.142412901 CET4924753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:31.198556900 CET53492478.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:31.685444117 CET5228653192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:31.742531061 CET53522868.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:32.250085115 CET5606453192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:32.309338093 CET53560648.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:32.971565962 CET6374453192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:33.019469976 CET53637448.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:33.227957010 CET6145753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:33.295059919 CET53614578.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:33.645874977 CET5836753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:33.702230930 CET53583678.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:34.865190983 CET6059953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:34.922327042 CET53605998.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:35.781820059 CET5957153192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:35.829627991 CET53595718.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:20:36.496061087 CET5268953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:20:36.552227020 CET53526898.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:08.226511002 CET5029053192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:08.275254965 CET53502908.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:24.251454115 CET6042753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:24.307600975 CET53604278.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:25.996978045 CET5620953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:26.057513952 CET53562098.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:27.343066931 CET5958253192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:27.390883923 CET53595828.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:31.240375042 CET6094953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:31.298129082 CET53609498.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:36.494344950 CET5854253192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:36.553634882 CET53585428.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:21:57.401041031 CET5917953192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:21:57.457227945 CET53591798.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:22:02.728920937 CET6092753192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:22:02.788012981 CET53609278.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:22:09.289910078 CET5785453192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:22:09.349340916 CET53578548.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:22:30.361867905 CET6202653192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:22:30.419929981 CET53620268.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:22:35.605401039 CET5945353192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:22:35.663017988 CET53594538.8.8.8192.168.2.7
                                                        Jan 21, 2021 07:22:40.853759050 CET6246853192.168.2.78.8.8.8
                                                        Jan 21, 2021 07:22:40.910154104 CET53624688.8.8.8192.168.2.7

                                                        DNS Queries

                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        Jan 21, 2021 07:21:25.996978045 CET192.168.2.78.8.8.80x34f5Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:31.240375042 CET192.168.2.78.8.8.80x4116Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:36.494344950 CET192.168.2.78.8.8.80x2199Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:57.401041031 CET192.168.2.78.8.8.80x8b50Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:02.728920937 CET192.168.2.78.8.8.80x6ffaStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:09.289910078 CET192.168.2.78.8.8.80x8aceStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:30.361867905 CET192.168.2.78.8.8.80xb7d8Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:35.605401039 CET192.168.2.78.8.8.80xdeabStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:40.853759050 CET192.168.2.78.8.8.80x60dStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)

                                                        DNS Answers

                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        Jan 21, 2021 07:21:26.057513952 CET8.8.8.8192.168.2.70x34f5No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:31.298129082 CET8.8.8.8192.168.2.70x4116No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:36.553634882 CET8.8.8.8192.168.2.70x2199No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:21:57.457227945 CET8.8.8.8192.168.2.70x8b50No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:02.788012981 CET8.8.8.8192.168.2.70x6ffaNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:09.349340916 CET8.8.8.8192.168.2.70x8aceNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:30.419929981 CET8.8.8.8192.168.2.70xb7d8No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:35.663017988 CET8.8.8.8192.168.2.70xdeabNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                        Jan 21, 2021 07:22:40.910154104 CET8.8.8.8192.168.2.70x60dNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)

                                                        Code Manipulations

                                                        Statistics

                                                        CPU Usage

                                                        Click to jump to process

                                                        Memory Usage

                                                        Click to jump to process

                                                        High Level Behavior Distribution

                                                        Click to dive into process behavior distribution

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:07:19:36
                                                        Start date:21/01/2021
                                                        Path:C:\Users\user\Desktop\PO#4018-308875.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\PO#4018-308875.exe'
                                                        Imagebase:0x9f0000
                                                        File size:716800 bytes
                                                        MD5 hash:26B17B353C8950CA0A55E1EA21678D9E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.339312543.00000000047A4000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        Reputation:low

                                                        General

                                                        Start time:07:19:41
                                                        Start date:21/01/2021
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
                                                        Imagebase:0x1310000
                                                        File size:232960 bytes
                                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:07:19:41
                                                        Start date:21/01/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff774ee0000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:07:19:42
                                                        Start date:21/01/2021
                                                        Path:C:\Windows\SysWOW64\reg.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'erwtvsfvc' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
                                                        Imagebase:0xd00000
                                                        File size:59392 bytes
                                                        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:07:20:23
                                                        Start date:21/01/2021
                                                        Path:C:\Users\user\AppData\Roaming\hjfufkimd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\AppData\Roaming\hjfufkimd.exe'
                                                        Imagebase:0xb70000
                                                        File size:716800 bytes
                                                        MD5 hash:26B17B353C8950CA0A55E1EA21678D9E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.632887895.0000000004935000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.633244626.0000000004ACB000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        Reputation:low

                                                        General

                                                        Start time:07:21:01
                                                        Start date:21/01/2021
                                                        Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user~1\AppData\Local\Temp\InstallUtil.exe
                                                        Imagebase:0x9b0000
                                                        File size:41064 bytes
                                                        MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000001A.00000002.632805982.0000000005620000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.633000163.0000000005F00000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.624554615.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.630562500.0000000003E99000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        Antivirus matches:
                                                        • Detection: 0%, Virustotal, Browse
                                                        • Detection: 0%, Metadefender, Browse
                                                        • Detection: 0%, ReversingLabs
                                                        Reputation:moderate

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >

                                                          Executed Functions

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ($<$ntin$ntin
                                                          • API String ID: 0-2884023141
                                                          • Opcode ID: 33f4d1ee8c533a6fddd93d2307b6d1b86e6924a0d8368031445156bdefeb58c5
                                                          • Instruction ID: 5ca07ed26ca8d8c90903728f6242d1e961f58eebe95fc4e0c7ee6f7fa2868bf1
                                                          • Opcode Fuzzy Hash: 33f4d1ee8c533a6fddd93d2307b6d1b86e6924a0d8368031445156bdefeb58c5
                                                          • Instruction Fuzzy Hash: B6A2E0B4E04219CFDB14CF99C985B9DFBB2BF99304F24C1A9D508AB255D730AA81CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: D0Jl$D0Jl$D0Jl
                                                          • API String ID: 0-2613827940
                                                          • Opcode ID: b4d7a8443dbaa174acf66c3cb224422fa227d88ad5e6c47208e527f0f6a43340
                                                          • Instruction ID: 78ab139943f17db71be8db3cf6e2d2f68290e0f90c15e5beee1c7a8811651963
                                                          • Opcode Fuzzy Hash: b4d7a8443dbaa174acf66c3cb224422fa227d88ad5e6c47208e527f0f6a43340
                                                          • Instruction Fuzzy Hash: F3727D34B002198FDB58CF69C894AAEBBF2BF88704F148569E545AB361DB35EC41CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: xEl$xEl$+!8l^
                                                          • API String ID: 0-1260320397
                                                          • Opcode ID: fd9784c03f0fc9ab459987cf61a57aca6e9e5e7807ed2e404e74d596c0b40c09
                                                          • Instruction ID: 49a70044d216838cf285f6d99ad4fe5ad48f97275db8d2c91e51ad4d6f45cbed
                                                          • Opcode Fuzzy Hash: fd9784c03f0fc9ab459987cf61a57aca6e9e5e7807ed2e404e74d596c0b40c09
                                                          • Instruction Fuzzy Hash: 0A22F6B4D01228CFDB69DF65D894BDDBBB2BF89301F1085AAD40AA7350DB759A81CF10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: <$ntin$ntin
                                                          • API String ID: 0-1029651476
                                                          • Opcode ID: 499e0cd3e7e04e712a5f0cbb5df1def1275c93f073a53a98b07e59cd786661fd
                                                          • Instruction ID: c37a26e8a2a3d94e17925d5a893c500e4b7c9821111370d3dc91fd75f0d84025
                                                          • Opcode Fuzzy Hash: 499e0cd3e7e04e712a5f0cbb5df1def1275c93f073a53a98b07e59cd786661fd
                                                          • Instruction Fuzzy Hash: D3E1B4B1E046198FDB18CFAAC9416DEFBF2BF89300F14C1AAD508AB265D7349A41CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: <$@
                                                          • API String ID: 0-1426351568
                                                          • Opcode ID: b96b5aeaf4991c415bc900b2b924ffc8aaa4a5b6f673f3ba033bbff21fbcf473
                                                          • Instruction ID: ddaf6f545bdbac7327da91ded66abf9e1455e62d6be1920e075f56a05df02769
                                                          • Opcode Fuzzy Hash: b96b5aeaf4991c415bc900b2b924ffc8aaa4a5b6f673f3ba033bbff21fbcf473
                                                          • Instruction Fuzzy Hash: D062EC70E00219CFEB64CFA9CA85A9DFBF2BF48754F15C1A9D548AB221E7309981CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ec7d87ae5b96e927aaba737e0868b9cb537df9871eb239aec03f5b9876435307
                                                          • Instruction ID: 75b5567f389207356b6e0518887e4c4d89943ae26f91fde42c13d3669c34cfb6
                                                          • Opcode Fuzzy Hash: ec7d87ae5b96e927aaba737e0868b9cb537df9871eb239aec03f5b9876435307
                                                          • Instruction Fuzzy Hash: CF828E30A00609CFCB15CF68C584AAEBBF2FF88714F1585A9E9859B2A2D731ED51CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e24f375650ff535a0e27426eceda79a086bbd135b3cee30661e663d61f364bc1
                                                          • Instruction ID: 2e038a71739dde2db5e8e66c8aa20b25a2d2992c696d93043721d21d62027481
                                                          • Opcode Fuzzy Hash: e24f375650ff535a0e27426eceda79a086bbd135b3cee30661e663d61f364bc1
                                                          • Instruction Fuzzy Hash: CB427074E01219CFDB54DFA9C984B9DBBB2FF88310F2586A9D809A7355D730AA81CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9037b06dd4935f51246b17ac9dc86e951d5afc3e6bb34a0359cd89b5ec95c58c
                                                          • Instruction ID: ae5cbab62709c59e8544ebefda8e8830df0678b42a82b5da2149cff56526f8ab
                                                          • Opcode Fuzzy Hash: 9037b06dd4935f51246b17ac9dc86e951d5afc3e6bb34a0359cd89b5ec95c58c
                                                          • Instruction Fuzzy Hash: EA32D370900218CFEB50DBA9CA88A9DFBF2BF49615F55C199C54CAB221DB30DD85CF62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 170d61bb922d04ce6d14436c9b482d29c1d7196c9c32f749df71c22f7b77eadb
                                                          • Instruction ID: 8384340f2dc0c10c898d47423aa7dd235f7e1046df76561a3b76210b4947d7c2
                                                          • Opcode Fuzzy Hash: 170d61bb922d04ce6d14436c9b482d29c1d7196c9c32f749df71c22f7b77eadb
                                                          • Instruction Fuzzy Hash: 6AD1C2B4E01218CFDB28DFA5D954BEDBBF1BB8A305F2081AAD809A7354DB345A45CF10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1baaad9eda5539ac1aaf85cb2e65d8ad261c0957aac55a1a181c218e678fc572
                                                          • Instruction ID: 9f7855614fe0fdf75a1c826717291c45cb25610b2b83d0028b76224df18eb602
                                                          • Opcode Fuzzy Hash: 1baaad9eda5539ac1aaf85cb2e65d8ad261c0957aac55a1a181c218e678fc572
                                                          • Instruction Fuzzy Hash: 7AD1A1B4E01218CFDB28DFA5D954BEDBBF1BB8A305F2081AAD809A7354DB345A45CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 403e4f965d58f27ced9f3a9b8f38a3cb89ed70bf2f1450f23b1b78d7f8a9f003
                                                          • Instruction ID: e4c94a77cde9b89d99e464fdb66865c68d588463bd3a6ee56250aae3a36eec7b
                                                          • Opcode Fuzzy Hash: 403e4f965d58f27ced9f3a9b8f38a3cb89ed70bf2f1450f23b1b78d7f8a9f003
                                                          • Instruction Fuzzy Hash: 0FD1B0B4E00218CFDB54DFA9D944B9DBBB2BF88304F1085AAD949AB354DB309E85CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 585aec38aadac7d8f14379296f8c6361b7fc27872d92cc4bdb9097f387533d55
                                                          • Instruction ID: 078e9c63a6c7fdcce5347673c896ffa648ca08985fab1404291954dfdc80bf7d
                                                          • Opcode Fuzzy Hash: 585aec38aadac7d8f14379296f8c6361b7fc27872d92cc4bdb9097f387533d55
                                                          • Instruction Fuzzy Hash: B3B126B0E003099FCB14DFA9C494A9EBBF1EF99314F24852DE509AB350DB74A985CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6707f0b4a0d3bb1a575a889facaebf56b982c46c1ba35c2739303eb019f2e4b9
                                                          • Instruction ID: 596e7e28ffda83d7e181f66a3ebca3e971f8803ed3a32bfde747c94aeb6d2fe0
                                                          • Opcode Fuzzy Hash: 6707f0b4a0d3bb1a575a889facaebf56b982c46c1ba35c2739303eb019f2e4b9
                                                          • Instruction Fuzzy Hash: 1CB1E4B1E002588FDB14DFA9C944ADDBBB2BF89304F2481AAD448AB355EB319985CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9a944fcdd3ad70b3f8f0f89f9bb7cbfd8f7f36e0af4b094db90e3f3ed8092ec7
                                                          • Instruction ID: 5b0a1f46012439763e8d31bb900b246ad2aec6e02ae8d18e1b0479bcd9399960
                                                          • Opcode Fuzzy Hash: 9a944fcdd3ad70b3f8f0f89f9bb7cbfd8f7f36e0af4b094db90e3f3ed8092ec7
                                                          • Instruction Fuzzy Hash: AEA1D174D00618CFDB54EFA9D944B9DFBB2FF88304F1085AAD448AB264DB305A95CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0dcd3b99563ebff02b68e5c5262548168093f14a4482f45c09c0462aeace6a84
                                                          • Instruction ID: 6ae66ab8876a935a6b155dccd0869f5679abe99fe59e95c3dac9de3d7e0d8065
                                                          • Opcode Fuzzy Hash: 0dcd3b99563ebff02b68e5c5262548168093f14a4482f45c09c0462aeace6a84
                                                          • Instruction Fuzzy Hash: 555144B4E00258CFDB18DFA9C8887EDBBB2AF4A314F248129D401BB394C7759986CF14
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fec4afa2b464812f9c1f5b56a0b1f1553a2a55f326d7dcd76d7ff7732657a674
                                                          • Instruction ID: 4fa8a91518036ec8aa93bb30de870f882984031564926a0cc114433a9bfb391d
                                                          • Opcode Fuzzy Hash: fec4afa2b464812f9c1f5b56a0b1f1553a2a55f326d7dcd76d7ff7732657a674
                                                          • Instruction Fuzzy Hash: B041A9B4D002489FDB10CFA9C588ADEBBF0AB09304F20912AE919BB350D774A949CF95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3ffd418ac1c4b967059c315e3d4e3fed7ca98eb832337c83c8eef7a39d551214
                                                          • Instruction ID: 78d9bc768ba2ffabce01b1e935054658020364b0bdbe6bc551d29b9b49a7fbff
                                                          • Opcode Fuzzy Hash: 3ffd418ac1c4b967059c315e3d4e3fed7ca98eb832337c83c8eef7a39d551214
                                                          • Instruction Fuzzy Hash: 6A41B9B4E052489FDB10CFA9C584BDEFBF0AB09314F20902AE415BB250DB75A989CF55
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6896d81a10782cb630fde17b27afc0cf50104349eaa13637f07e306bebe25694
                                                          • Instruction ID: 760ddf8cb01c80b3577e8662826f5ba2685b0484ee952b588406124fe4d286d7
                                                          • Opcode Fuzzy Hash: 6896d81a10782cb630fde17b27afc0cf50104349eaa13637f07e306bebe25694
                                                          • Instruction Fuzzy Hash: 1F41B9B4E052089FDB10CFA9C584BDEFBF0AB09314F20902EE405BB250DB74A949CF99
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 43a68897a8ddd7ff76f1830debd2be8f95270fddbe6401b73d15bcbd60738f11
                                                          • Instruction ID: 4b89962052ff0114049b546f6dbe0873e3705a0a8a1855f114385df0b09efa08
                                                          • Opcode Fuzzy Hash: 43a68897a8ddd7ff76f1830debd2be8f95270fddbe6401b73d15bcbd60738f11
                                                          • Instruction Fuzzy Hash: E12134B1D012289FDB04DFA4D818BEEBBB1EB8A315F40546AC151B32A0CB785945CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a8f141d474e2f6ac3ad60ddb02e8b9412c8e209432cf4b980a07dcda467b19ac
                                                          • Instruction ID: 1639db4ad3bb8507c3e0a862ebc5802125c0c70a4ae443e37199e23ae63dd1fc
                                                          • Opcode Fuzzy Hash: a8f141d474e2f6ac3ad60ddb02e8b9412c8e209432cf4b980a07dcda467b19ac
                                                          • Instruction Fuzzy Hash: 18318CB4E01209EFCB14CFAAD484AADBBB2BB49310F24912AE814B7350D7349985CF58
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7d035a4118c1fbf4be952295aac240b8174bc5b8cabeb0676dbb028fff996e32
                                                          • Instruction ID: 7938b67cf2cb817f997088295d03c8744e40d129aa628f4433c089c17679075e
                                                          • Opcode Fuzzy Hash: 7d035a4118c1fbf4be952295aac240b8174bc5b8cabeb0676dbb028fff996e32
                                                          • Instruction Fuzzy Hash: 4E315DB4E05209EFCB14CFAAD584AADBBF2BB49350F24D129E814B7350D7349945CF58
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d64026496abc9781dcec538abda743b3c8d93c28a6919a8e55ba9d2c6286ff58
                                                          • Instruction ID: 71d65079bca88b1cc2f0eb458760d734c39d0c34d42b78d002e13e1160936978
                                                          • Opcode Fuzzy Hash: d64026496abc9781dcec538abda743b3c8d93c28a6919a8e55ba9d2c6286ff58
                                                          • Instruction Fuzzy Hash: 4E21A3B4D04209DFDB04DFAAD4446EDBBF1AB5A320F24E129E824B73A4E7348581CF58
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4cfc6d7b6e43c6cd7019a21947658c3f38225ef4fb389883e9ab86f26b768281
                                                          • Instruction ID: 545d05654436f78a6ee5bc23de2a2b8ac5225f1215cbefcb69ec576b4089c937
                                                          • Opcode Fuzzy Hash: 4cfc6d7b6e43c6cd7019a21947658c3f38225ef4fb389883e9ab86f26b768281
                                                          • Instruction Fuzzy Hash: 1921C0B4E00209DFDB04CFAAC4446EDBBF1AB5A320F14E129E824B7364E7348941CF58
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cd832590ef106ce8aad4410bdda3b70b5a27a792883772de15e9545b47b5850c
                                                          • Instruction ID: 8bdb850442408941471298bd3d5889a3a7cd2a34468a2c5592b7dc70aab022b4
                                                          • Opcode Fuzzy Hash: cd832590ef106ce8aad4410bdda3b70b5a27a792883772de15e9545b47b5850c
                                                          • Instruction Fuzzy Hash: 520156B0D192899FCB01DFB8C914BEEBFB0AF0A204F1085AAC044A7291D7744A56CF81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CopyFileExW.KERNELBASE(?,?,?,?,?,?), ref: 078CE9D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: CopyFile
                                                          • String ID:
                                                          • API String ID: 1304948518-0
                                                          • Opcode ID: d4668cbc753c89d421fc26618e7dcf74e76d6b481b54be94f61e15bf030548dd
                                                          • Instruction ID: 859c474ecefec8a55f694855ecf794600df7b5a1ecfa437afb0d0bd6f5f3c2ab
                                                          • Opcode Fuzzy Hash: d4668cbc753c89d421fc26618e7dcf74e76d6b481b54be94f61e15bf030548dd
                                                          • Instruction Fuzzy Hash: C2C1DEB4E00218CFDB24CFA9C981B9DBBB1FF59304F1481A9E449A7351DB34AA85CF45
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CopyFileExW.KERNELBASE(?,?,?,?,?,?), ref: 078CE9D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: CopyFile
                                                          • String ID:
                                                          • API String ID: 1304948518-0
                                                          • Opcode ID: f64796a6de07c675db261dbcea80f7e43aa828298e0f8fb99152814fcd64440d
                                                          • Instruction ID: 96ddf0f22038bd84344ff9c4b5d5e00854fa5f2d1d74679ca8c1eb10184b08a2
                                                          • Opcode Fuzzy Hash: f64796a6de07c675db261dbcea80f7e43aa828298e0f8fb99152814fcd64440d
                                                          • Instruction Fuzzy Hash: 29B1FFB4E00219CFDB24CFA9C981B9DBBB1FF59304F1481A9E849A7351DB34AA85CF45
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CopyFileExW.KERNELBASE(?,?,?,?,?,?), ref: 078CE9D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: CopyFile
                                                          • String ID:
                                                          • API String ID: 1304948518-0
                                                          • Opcode ID: 9af994862f8ed65110bb7008745158ec25cd101b7995475c93f4b4d6ea76f728
                                                          • Instruction ID: d35ac03f818c6258d17b0ffc58f4406341266895d4abc2438f9d92fa22b00840
                                                          • Opcode Fuzzy Hash: 9af994862f8ed65110bb7008745158ec25cd101b7995475c93f4b4d6ea76f728
                                                          • Instruction Fuzzy Hash: CBB1EFB4E002198FDB24CFA9C981B9DBBB1FF49304F1481A9E858B7351DB34AA85CF45
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 078C0EE7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: d72e849255b8c2390b27580543f37faf51b1c00476d3603c1a9e4f473b91e4bb
                                                          • Instruction ID: 8b8588a1c6dedafea5517e8078a35e5c60933630a9d42d297e0417c841369778
                                                          • Opcode Fuzzy Hash: d72e849255b8c2390b27580543f37faf51b1c00476d3603c1a9e4f473b91e4bb
                                                          • Instruction Fuzzy Hash: CB41BBB5D04258DFCF10CFA9E884AEEFBB0AB59314F24906AE814B7250C735A946CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 010CC007
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 0aa392fc5d385c14f617b48d9603e9a39be978af19bf3692d899519ffa7374e8
                                                          • Instruction ID: 6e5298ca10e998f77684385323125808bbc7324b0a3730e803eee950259bf102
                                                          • Opcode Fuzzy Hash: 0aa392fc5d385c14f617b48d9603e9a39be978af19bf3692d899519ffa7374e8
                                                          • Instruction Fuzzy Hash: 2E31BBB4D042589FCB10CFA9D584AEEFBB1BB49310F24902AE854B7210C335A946CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?), ref: 078C1649
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: DeleteFile
                                                          • String ID:
                                                          • API String ID: 4033686569-0
                                                          • Opcode ID: be7ad0ba5a12ffa8174b683a058d9eb14be431eba2da0baa3bb6a4a151bdf597
                                                          • Instruction ID: 42ee3a0e158927910265abe9b56b15b74933fecbf98cfa277418317198d4d9b0
                                                          • Opcode Fuzzy Hash: be7ad0ba5a12ffa8174b683a058d9eb14be431eba2da0baa3bb6a4a151bdf597
                                                          • Instruction Fuzzy Hash: 4D41FBB4D05218DFCB00CFA9E588AEEFBF1AB49314F14906AE809B7311D734AA46CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 010CC007
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 65a4c54e5ba35deb02859ee49d7edbdbff86e335ef617f95c10e0d4a43875662
                                                          • Instruction ID: a6ce17f1cd4477e14c857d2d99314b81c0817e8cd17e0c1e7f296b67dfc77a55
                                                          • Opcode Fuzzy Hash: 65a4c54e5ba35deb02859ee49d7edbdbff86e335ef617f95c10e0d4a43875662
                                                          • Instruction Fuzzy Hash: 023198B9D042589FCF10CFA9E584AEEFBF0BB49310F24902AE818B7210D735A945CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 078C0EE7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: dd3850798b88e646944f40ae9ba4c118a09854ff2697ea0321173fb35c21aed2
                                                          • Instruction ID: 49a95b9973710c2de77e20a1cd42f74e0b04324d700ee3c2a9d811750572adfe
                                                          • Opcode Fuzzy Hash: dd3850798b88e646944f40ae9ba4c118a09854ff2697ea0321173fb35c21aed2
                                                          • Instruction Fuzzy Hash: 4C3197B9D05258DFCF10CFA9E884AEEFBB4BB59310F14902AE814B7210D734A985CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?), ref: 078C1649
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID: DeleteFile
                                                          • String ID:
                                                          • API String ID: 4033686569-0
                                                          • Opcode ID: 973c7c2e70001454d8c8d1f6ce242417ce8087dde639ca62d0e40aa38da777d1
                                                          • Instruction ID: b5237830358c3d7a3b70640cf0661755a7fd342ea325c42ff791f60ca5b8bdc3
                                                          • Opcode Fuzzy Hash: 973c7c2e70001454d8c8d1f6ce242417ce8087dde639ca62d0e40aa38da777d1
                                                          • Instruction Fuzzy Hash: F531C9B4D01258DFCB10CFA9D888AEEFBF4BB49314F14842AE404B7210D734AA45CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Non-executed Functions

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.338149659.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID: D0Jl
                                                          • API String ID: 0-1607171866
                                                          • Opcode ID: dc812ba13230596476cd7c5450dc65ce32cb58ce4907814876bf4dd5b0b6421c
                                                          • Instruction ID: e74dbf2f3f48e90fc4fbe0e18b20b87b4a1ef8079e000140d72c6591ddc50a9b
                                                          • Opcode Fuzzy Hash: dc812ba13230596476cd7c5450dc65ce32cb58ce4907814876bf4dd5b0b6421c
                                                          • Instruction Fuzzy Hash: AC81A030F04218CBCF18EBB5945567EB6A3BFC9650F05892EE586E7388DF399C018B95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b516ecfb94a1b43b7296795ec92c71782945227b71119707c98c65e8155ee073
                                                          • Instruction ID: a41a16bdd79e36acb274600e7e088a966bc8cf4ec57e240168a81b2656c48a7a
                                                          • Opcode Fuzzy Hash: b516ecfb94a1b43b7296795ec92c71782945227b71119707c98c65e8155ee073
                                                          • Instruction Fuzzy Hash: 4C02F6B4D05228CFDB24CFA5D944BEDBBB2BF49314F1481A9D448AB391DB349A85CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a1643ddfc74f4e132691778a4e3e226027a9bfd30d76cb87221a75243584043e
                                                          • Instruction ID: 5f8bb09bddd66500222ba466af8a74e23f3375b6e7936b8f0278f583d962ef23
                                                          • Opcode Fuzzy Hash: a1643ddfc74f4e132691778a4e3e226027a9bfd30d76cb87221a75243584043e
                                                          • Instruction Fuzzy Hash: C4D11A30C1075A9ADB10EB68C990ADDB7B1FFA5300F61979AD1497B214EB706AC4CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bda7361e2d354193ada057df94ff430fbdc33b65cc7cb4bccfb1f3fdc247d38f
                                                          • Instruction ID: 1a6e985c7ebddf48098e7c70229f23ce15bc221aad14d1ed348e837b783722f2
                                                          • Opcode Fuzzy Hash: bda7361e2d354193ada057df94ff430fbdc33b65cc7cb4bccfb1f3fdc247d38f
                                                          • Instruction Fuzzy Hash: 1ED11A30C1075A9ADB10EB68C990ADDB7B1FFE5300F619B9AD1497B214EB706AC4CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c10099a47f7286a768e3416e5efd393111ca38b170da5c2b57fd0c159f762eab
                                                          • Instruction ID: cc8efd888a41608eaec149c5b52efc92f1b9e53a159949677b73a49044794ca4
                                                          • Opcode Fuzzy Hash: c10099a47f7286a768e3416e5efd393111ca38b170da5c2b57fd0c159f762eab
                                                          • Instruction Fuzzy Hash: BC015FB5D052099F8B04DFA9E4414EEFBF2AB5A310F10A16AE845B7314E73499518FA8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.345924177.00000000078C0000.00000040.00000001.sdmp, Offset: 078C0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                          • Instruction ID: 3883438588ca2d37a55d0b2aa08df82e5a6e533fd00936ea0ee61dcdf710b11c
                                                          • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                          • Instruction Fuzzy Hash: AEF042B5E0520C9F8F04DFA9D5418EEFBF2AB5A310F10A16AE814B3310E73599518FA8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Executed Functions

                                                          APIs
                                                          • CreateProcessAsUserW.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,056A555D,?,?,?), ref: 056A57C4
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: CreateProcessUser
                                                          • String ID:
                                                          • API String ID: 2217836671-0
                                                          • Opcode ID: fced9795625f0974f90fa6ed057be0b139c098acf6bc027dad585a4850cdfe96
                                                          • Instruction ID: 523fa9d6beab5dacbf3154da46400fe68d17a25b7492363468126b54abaea122
                                                          • Opcode Fuzzy Hash: fced9795625f0974f90fa6ed057be0b139c098acf6bc027dad585a4850cdfe96
                                                          • Instruction Fuzzy Hash: 9A91DF71D0426C9FCF25CFA4C884BDDBBB1AB59304F0490AAE549B7220DB70AE85CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessAsUserW.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,056A555D,?,?,?), ref: 056A57C4
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: CreateProcessUser
                                                          • String ID:
                                                          • API String ID: 2217836671-0
                                                          • Opcode ID: baadcc22c2729c09c95dc04fdaabb78b4598447bb9dbd95cd5bfe0980a9e3921
                                                          • Instruction ID: 9ad42decee913ab76f02908b9d9ec41b9626e9453e7ab816b64db4cd8ffb9bae
                                                          • Opcode Fuzzy Hash: baadcc22c2729c09c95dc04fdaabb78b4598447bb9dbd95cd5bfe0980a9e3921
                                                          • Instruction Fuzzy Hash: ED91DF75D0426D9FCF25CFA4C880BDDBBB1AB59304F0490AAE549B7220DB70AE85CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 056A847B
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 3f762df0af20f54b854472e1f8c2b56ef64643287bcebf17ef0aacacda859a3f
                                                          • Instruction ID: fb3dfde1ee97bba4375b5d9b9df7372c911b16e26dcd60271c03b9ba800cf79d
                                                          • Opcode Fuzzy Hash: 3f762df0af20f54b854472e1f8c2b56ef64643287bcebf17ef0aacacda859a3f
                                                          • Instruction Fuzzy Hash: AB41BAB5D052589FCF00CFA9D984AEEFBF1BB49314F14902AE815B7250D738AA45CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 056A847B
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 0e64ecf3b782851d95c9d151a166303fc9cb442f591275e2d6879b17e0cb6cc2
                                                          • Instruction ID: 5f06bf55dc22a650ca1cc0b692c4b38de07e5e9b2eee6b89e1d8d5e165c06460
                                                          • Opcode Fuzzy Hash: 0e64ecf3b782851d95c9d151a166303fc9cb442f591275e2d6879b17e0cb6cc2
                                                          • Instruction Fuzzy Hash: 67418AB5D052589FCF00CFA9D984ADEBBF1BB49314F14942AE815B7210D738AA45CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 056A816A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: d96e098a068fe9ea6f3aa99ec3452aeb5a13dec772e364de9e9f3b489a715c3d
                                                          • Instruction ID: 529abc3c2c47e15137de78963247c5155f68536603c10771f68d6b7678877f43
                                                          • Opcode Fuzzy Hash: d96e098a068fe9ea6f3aa99ec3452aeb5a13dec772e364de9e9f3b489a715c3d
                                                          • Instruction Fuzzy Hash: 8C31A9B9D04258DFCF00CFA9D884ADEBBB1BB49320F14942AE815B7710C735A946CF95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 056A816A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 0842b807716100b6a4b2c94bd7c3698252b9105ec45a62753850f8cd650fc1cc
                                                          • Instruction ID: 2304945c076de6b6b0bfaf58cefc4d865ada92d8dcdc36123b21bf8b9d03cb23
                                                          • Opcode Fuzzy Hash: 0842b807716100b6a4b2c94bd7c3698252b9105ec45a62753850f8cd650fc1cc
                                                          • Instruction Fuzzy Hash: D93186B9D042589FCF10CFA9D884ADEFBB1BB49310F14942AE815B7310D735A946CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetThreadContext.KERNELBASE(?,?), ref: 056A89D7
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ContextThread
                                                          • String ID:
                                                          • API String ID: 1591575202-0
                                                          • Opcode ID: 8180c9f6641a61b47ae8792199c2956fbc5071d26530753d148e8a2723ee1eee
                                                          • Instruction ID: 9c4d579cc109bd9c27a7f13590cb3a181c59dc0269bf113a3caab260958383b0
                                                          • Opcode Fuzzy Hash: 8180c9f6641a61b47ae8792199c2956fbc5071d26530753d148e8a2723ee1eee
                                                          • Instruction Fuzzy Hash: 7841DBB5D052589FDB14CFA9D884AEEFBF1BF48314F14842AE415B7200D738A985CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetThreadContext.KERNELBASE(?,?), ref: 056A7677
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ContextThread
                                                          • String ID:
                                                          • API String ID: 1591575202-0
                                                          • Opcode ID: f784ee71e4bd0bb8fcafff371d0aa7aafddaa30efee034e4db57c787e54b321f
                                                          • Instruction ID: b007828ff653ebc2063670f1feaa8d5320e41f031fa81783ece918b936b6be81
                                                          • Opcode Fuzzy Hash: f784ee71e4bd0bb8fcafff371d0aa7aafddaa30efee034e4db57c787e54b321f
                                                          • Instruction Fuzzy Hash: 2541CAB5D052589FCB10CFA9D884AEEFBF1BF48314F14942AE419B7600C738A985CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,514A1B1F,DBBDF2D4), ref: 0168C007
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.626261199.0000000001680000.00000040.00000001.sdmp, Offset: 01680000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: a7c3af3bf84b43e50c6e969a1a4af501a9238740f9361287d47ac6a5af0a273e
                                                          • Instruction ID: fdfb44959a10b7862557d2e971fc78264f9d15a562550f0ce8f37638bd49c084
                                                          • Opcode Fuzzy Hash: a7c3af3bf84b43e50c6e969a1a4af501a9238740f9361287d47ac6a5af0a273e
                                                          • Instruction Fuzzy Hash: 183199B9D042589FCB10CFA9D884AEEFBF0BB19310F24902AE815B7310D775A945CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,514A1B1F,DBBDF2D4), ref: 0168C007
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.626261199.0000000001680000.00000040.00000001.sdmp, Offset: 01680000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 53e47770a24c19034598cdac07be75ff8315ad46b0582f0c355f5974a9cb30f5
                                                          • Instruction ID: 4d424ab0c0a3cbd8274a68e861701de881d19b121da01834fd0c22f42a1b1837
                                                          • Opcode Fuzzy Hash: 53e47770a24c19034598cdac07be75ff8315ad46b0582f0c355f5974a9cb30f5
                                                          • Instruction Fuzzy Hash: A73199B9D042589FCB10CFA9E884AEEFBB0BB19310F14902AE814B7310D735A946CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 056F0EE7
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.635061490.00000000056F0000.00000040.00000001.sdmp, Offset: 056F0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 89198bc67f16afbe06e784858eba6b2c03074838b9cf44ca509721d53792ce7d
                                                          • Instruction ID: 91f1d33f16d4a1183410ee3c497a8db31a72be40053950ea025633302551a292
                                                          • Opcode Fuzzy Hash: 89198bc67f16afbe06e784858eba6b2c03074838b9cf44ca509721d53792ce7d
                                                          • Instruction Fuzzy Hash: FE3199B9D052589FCB10CFA9D884ADEFBF0BB09320F14902AE815B7310D735A945CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetThreadContext.KERNELBASE(?,?), ref: 056A89D7
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ContextThread
                                                          • String ID:
                                                          • API String ID: 1591575202-0
                                                          • Opcode ID: 952a6da490ad59ec743b413b63872a1f40c6bc45ba2a01378c763019426c5b18
                                                          • Instruction ID: a36baf5512448eae0e9bd232e2c93e98c02d40e97144292c2fbe90d0a877354d
                                                          • Opcode Fuzzy Hash: 952a6da490ad59ec743b413b63872a1f40c6bc45ba2a01378c763019426c5b18
                                                          • Instruction Fuzzy Hash: 2931DAB5D042589FCB10CFAAD884AEEFBF1BF48314F14802AE415B7200D738A985CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetThreadContext.KERNELBASE(?,?), ref: 056A7677
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ContextThread
                                                          • String ID:
                                                          • API String ID: 1591575202-0
                                                          • Opcode ID: 90b0c51985be9d995bcc941c020a0e264d3d8a61048c0ff240eff4dac65bfc65
                                                          • Instruction ID: f6e0810c21de0c48169797a4a78cd6cc73e8b41b26d8caedda0df6c720c56a8b
                                                          • Opcode Fuzzy Hash: 90b0c51985be9d995bcc941c020a0e264d3d8a61048c0ff240eff4dac65bfc65
                                                          • Instruction Fuzzy Hash: D231BBB5D052589FDB10CFAAD884AEEFBF1BB49314F14802AE415B7240C738A985CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 056F0EE7
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.635061490.00000000056F0000.00000040.00000001.sdmp, Offset: 056F0000, based on PE: false
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 0a8d3cee44c13ed303b4a768a49389ac7d0f2090490b410d67d9bd65cad42ed5
                                                          • Instruction ID: 5ebad1db5858bd014401d47a6e1400771d3a8149674b82762152a7dcfa9435e0
                                                          • Opcode Fuzzy Hash: 0a8d3cee44c13ed303b4a768a49389ac7d0f2090490b410d67d9bd65cad42ed5
                                                          • Instruction Fuzzy Hash: 9B3197B9D052589FCB10CFA9E884ADEFBB0BB09320F14902AE815B7310D734AA45CF64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?), ref: 056F1649
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.635061490.00000000056F0000.00000040.00000001.sdmp, Offset: 056F0000, based on PE: false
                                                          Similarity
                                                          • API ID: DeleteFile
                                                          • String ID:
                                                          • API String ID: 4033686569-0
                                                          • Opcode ID: ca546b7dbecdd44ab1915a36311971ca72da969dcde7a04cdfb4c260c5f29bc4
                                                          • Instruction ID: b268f93034436dd64a9b4b3a415ec4b17db1fe39566e688765797f10da498337
                                                          • Opcode Fuzzy Hash: ca546b7dbecdd44ab1915a36311971ca72da969dcde7a04cdfb4c260c5f29bc4
                                                          • Instruction Fuzzy Hash: F531CCB4D05218DFCB00CFA9D984AAEFBF1BF49314F14846AE515B7610D334A986CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?), ref: 056F1649
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.635061490.00000000056F0000.00000040.00000001.sdmp, Offset: 056F0000, based on PE: false
                                                          Similarity
                                                          • API ID: DeleteFile
                                                          • String ID:
                                                          • API String ID: 4033686569-0
                                                          • Opcode ID: bdfc47f2dd6f1a3472d28b95a15298b200d9c3eda8f8920ecd1b2fb3b81b7dc5
                                                          • Instruction ID: b3edcc37759af8c575a3d0e5a01c62674f75251f0cbf2a2db2a26f0464a91826
                                                          • Opcode Fuzzy Hash: bdfc47f2dd6f1a3472d28b95a15298b200d9c3eda8f8920ecd1b2fb3b81b7dc5
                                                          • Instruction Fuzzy Hash: B731B8B4D05218DFCB10CFA9D884AEEFBF5BB49314F14806AE515B7210D734AA86CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ResumeThread.KERNELBASE(?), ref: 056A8BFE
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: 9cf5f819603394fb301caa5ca9a4c1e2037fbdc9e9379570de1e97127dfc3f70
                                                          • Instruction ID: adcd1ee53fb66623931936391d17cefffd2e3da2b9b6d6dd852500f125be1eba
                                                          • Opcode Fuzzy Hash: 9cf5f819603394fb301caa5ca9a4c1e2037fbdc9e9379570de1e97127dfc3f70
                                                          • Instruction Fuzzy Hash: 3C31CAB5D052189FDF14CFA9D984AEEFBB1AF48314F14842AE815B7700CB34A941CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ResumeThread.KERNELBASE(?), ref: 056A8BFE
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.634968291.00000000056A0000.00000040.00000001.sdmp, Offset: 056A0000, based on PE: false
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: 42bf677313b0b1a7ba34917fd45b9b93f3f24d26c220bc9f220a3f99d9b0ef0c
                                                          • Instruction ID: 7842466801910ff53153d4336c17d691fc34f06dc592f9a9669c5d06ced1cab9
                                                          • Opcode Fuzzy Hash: 42bf677313b0b1a7ba34917fd45b9b93f3f24d26c220bc9f220a3f99d9b0ef0c
                                                          • Instruction Fuzzy Hash: 7D31AAB5D052589FDF14CFA9D884AEEFBB5AB49314F14842AE815B7300CB34A941CFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Non-executed Functions

                                                          Executed Functions

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 02DBB730
                                                          • GetCurrentThread.KERNEL32 ref: 02DBB76D
                                                          • GetCurrentProcess.KERNEL32 ref: 02DBB7AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 02DBB803
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 31a429bdb69e5bd5798902064a4bc6a1999e54b4480ce9f297eec9c4a9dce577
                                                          • Instruction ID: a20a0363f50edfd13731a6bdaecd475cfc39ea7231be682b9377beef4afe6a2e
                                                          • Opcode Fuzzy Hash: 31a429bdb69e5bd5798902064a4bc6a1999e54b4480ce9f297eec9c4a9dce577
                                                          • Instruction Fuzzy Hash: 3C5144B4A057458FDB10CFA9C548BEEBBF0AF48318F24845AE419A7350C734AC45CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 02DBB730
                                                          • GetCurrentThread.KERNEL32 ref: 02DBB76D
                                                          • GetCurrentProcess.KERNEL32 ref: 02DBB7AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 02DBB803
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 36d60e6d661389e9eb9ae1549eec347eb51dc75db52e856230c7bc2fee40dd57
                                                          • Instruction ID: 25ee577f587c18c7c5076615d5a14db0c7a591fe546665a029cf22f56463100a
                                                          • Opcode Fuzzy Hash: 36d60e6d661389e9eb9ae1549eec347eb51dc75db52e856230c7bc2fee40dd57
                                                          • Instruction Fuzzy Hash: 645124B4A057498FDB14CFA9C548BDEBBF1AF48318F20845AE419A7350C774AC45CF65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632984589.0000000005EF0000.00000040.00000001.sdmp, Offset: 05EF0000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1f14065823bde443d878a3d39aeede61430a3b0c05b1b476e49740c19abe2f4a
                                                          • Instruction ID: 4ad0e12b7fad25841c450491acf41d7752455365d46f809f9ca30f292633a238
                                                          • Opcode Fuzzy Hash: 1f14065823bde443d878a3d39aeede61430a3b0c05b1b476e49740c19abe2f4a
                                                          • Instruction Fuzzy Hash: C0817A71D04209DFDB10DFA9C880AEEFBB1FF88314F14852AE955BB250EB709945CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02DB962E
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 530f6a6e09559a0aaa0bf9891eaff38a329e0024235149746d617dcf5cb010d8
                                                          • Instruction ID: 44fea432c924c541dd8b8b370c73ef52b21ca0dcd58b39992a59d33f87e367c0
                                                          • Opcode Fuzzy Hash: 530f6a6e09559a0aaa0bf9891eaff38a329e0024235149746d617dcf5cb010d8
                                                          • Instruction Fuzzy Hash: 99711270A00B458FD765DF2AC06079ABBF2BF88218F008A2DD58AD7B50DB34E845CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegQueryValueExA.KERNELBASE(00000000,05495F31,00020119,00000000,00000000,?), ref: 054962FF
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 8cd1b266448db8a1965d02a6be8a47ed378646b29d42724ff8b150202b2ac7bf
                                                          • Instruction ID: 6ad20040be5eac5b26547671bffc39b978f43e97a9737442d2cfa3ac75c3f12a
                                                          • Opcode Fuzzy Hash: 8cd1b266448db8a1965d02a6be8a47ed378646b29d42724ff8b150202b2ac7bf
                                                          • Instruction Fuzzy Hash: 05714770E042089FDF18CFA9C886BEEBBB1BF48314F15816AE855A7351DB749845CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegQueryValueExA.KERNELBASE(00000000,05495F31,00020119,00000000,00000000,?), ref: 054962FF
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID:
                                                          • API String ID: 3660427363-0
                                                          • Opcode ID: 0f1672d6f09263ea54c28f5959c87a0a687692b5bf3a91f18f746b462a14a839
                                                          • Instruction ID: 4c19e8534ed84f1037adaceaf2e567fdb41feb2a178ec3ec2e18064e0515fe10
                                                          • Opcode Fuzzy Hash: 0f1672d6f09263ea54c28f5959c87a0a687692b5bf3a91f18f746b462a14a839
                                                          • Instruction Fuzzy Hash: 25713770D042089FDF18CFA9C886BDEBBB1BF48314F15816AE855AB351DB749845CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 05EF3568
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632984589.0000000005EF0000.00000040.00000001.sdmp, Offset: 05EF0000, based on PE: false
                                                          Similarity
                                                          • API ID: Query_
                                                          • String ID:
                                                          • API String ID: 428220571-0
                                                          • Opcode ID: cc48bcd979c40ce96fe5d82133324c65d8028f75689bcdb3f71b79311337e6d7
                                                          • Instruction ID: ea439f3edbfc6cb62b24841127ae78a84f9bb22b34a1cba5b3f40880feba364a
                                                          • Opcode Fuzzy Hash: cc48bcd979c40ce96fe5d82133324c65d8028f75689bcdb3f71b79311337e6d7
                                                          • Instruction Fuzzy Hash: B95127B1D042599FDF10CFA9C880ADEBBB1FF48318F24852AE955B7250DB709986CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02DBFD0A
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: db93303b03da5376b31f2374f556ad88d6fffc9ec180742db8b18b564c7a7f3f
                                                          • Instruction ID: 5c201e3a73c7ce1278af342b951d15eb17a88a8caf06691762cccaa04e0e74be
                                                          • Opcode Fuzzy Hash: db93303b03da5376b31f2374f556ad88d6fffc9ec180742db8b18b564c7a7f3f
                                                          • Instruction Fuzzy Hash: F151D0B1D10308DFDB15CFA9D894ADEBBB1FF48314F24812AE819AB210D7749985CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02DBFD0A
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 333920aaf84bb6baf89b08e6e2328254315a78ee62f25fb048c2dcdeee43b6eb
                                                          • Instruction ID: 281cee1baf36bc1fdc2d18888d49cf5d330b0c7fecd39c17cfa060a9e6be5b38
                                                          • Opcode Fuzzy Hash: 333920aaf84bb6baf89b08e6e2328254315a78ee62f25fb048c2dcdeee43b6eb
                                                          • Instruction Fuzzy Hash: 6441AFB1D10309DFDB15CF99C894ADEBBB5FF48314F24812AE819AB210D7749985CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,?,?), ref: 054960AF
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: d586f9239b670c70cc6c84ce831f6d4f6344df73def81c8f0251388e9697a379
                                                          • Instruction ID: a4df01df29d71a111638fe6a9a4a86ebdaf10b0a37c533199fa62b96a894325e
                                                          • Opcode Fuzzy Hash: d586f9239b670c70cc6c84ce831f6d4f6344df73def81c8f0251388e9697a379
                                                          • Instruction Fuzzy Hash: 7D4142B1D003189FDF14CFA9C986BDEBBB1BF48310F14852AE819AB340DB749841CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,?,?), ref: 054960AF
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: 44f8023917c2291e283737b076ded510a45793075d14e3d246d4cfb28ada6512
                                                          • Instruction ID: a3916766a471161782a97a1d5bddb1d1a1ee5a6e315756eebb61162f24f46572
                                                          • Opcode Fuzzy Hash: 44f8023917c2291e283737b076ded510a45793075d14e3d246d4cfb28ada6512
                                                          • Instruction Fuzzy Hash: 554131B1D003589FDF14CFA9C886BDEBFB1BB48314F15812AE819AB350DB749845CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: DispatchMessage
                                                          • String ID:
                                                          • API String ID: 2061451462-0
                                                          • Opcode ID: d8589a7ff0bcd7ef4feb8e3844274e98421e3032002a8816d7745b7380e2ad62
                                                          • Instruction ID: 4fe4b416b054321410d27fbb0c028fd7454d264916dd1cd24d166f680fd76eb6
                                                          • Opcode Fuzzy Hash: d8589a7ff0bcd7ef4feb8e3844274e98421e3032002a8816d7745b7380e2ad62
                                                          • Instruction Fuzzy Hash: D63148B4A04258CFDF18CFA9D849AEEBBF1BF49324F0581AAD419A7361C7349844CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegCloseKey.KERNELBASE(00000000), ref: 0549642F
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID:
                                                          • API String ID: 3535843008-0
                                                          • Opcode ID: ceea91f230c3009d742c42457e2ce5bfa97a3968e563fb65bb55ec8edecbcfed
                                                          • Instruction ID: cbd4af1d2101fd167ba948630203e7827e3a2ba50133dafe30414a43b1321bd8
                                                          • Opcode Fuzzy Hash: ceea91f230c3009d742c42457e2ce5bfa97a3968e563fb65bb55ec8edecbcfed
                                                          • Instruction Fuzzy Hash: A831B1718083888FDB11DFA9C495BDABFF0EF15214F4584AFC055E7641D7389885CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02DBBD87
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 6bc675502854132f1b286671715515a15ad3e8742873e7229c03606eaba9efab
                                                          • Instruction ID: 099fa771f56d1a804418b0cc6df9a8ecdb0448c0b9d5df009477fa2cebc7528e
                                                          • Opcode Fuzzy Hash: 6bc675502854132f1b286671715515a15ad3e8742873e7229c03606eaba9efab
                                                          • Instruction Fuzzy Hash: A821D2B5901208DFDB11CFA9D984AEEBBF4EB48324F14842AE955A3310D778A954CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02DBBD87
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 10c00550225f04f3823caa852955f57acb07833f17f9ae3cf22096d17c6d5d80
                                                          • Instruction ID: 5a07ddc3f8b52cc65c00db10b9483e94373f0e31e84fea0f8ba35136801b76ff
                                                          • Opcode Fuzzy Hash: 10c00550225f04f3823caa852955f57acb07833f17f9ae3cf22096d17c6d5d80
                                                          • Instruction Fuzzy Hash: E821C2B5901208DFDB10CFAAD984ADEBBF8FB48324F14841AE955A3310D378A954CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02DB96A9,00000800,00000000,00000000), ref: 02DB98BA
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: e4d0e33198448e2eaa623543114d18683918d8345269a2c3dcf2db49da762439
                                                          • Instruction ID: 034b8bbdb056ce35b9318f3b46123655637063378541fa09c6a27cbbbfe8e7c1
                                                          • Opcode Fuzzy Hash: e4d0e33198448e2eaa623543114d18683918d8345269a2c3dcf2db49da762439
                                                          • Instruction Fuzzy Hash: AD2122B6900249CFDB11CF9AC444ADEBBF4AF88324F00842ED516A7700C374A945CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02DB96A9,00000800,00000000,00000000), ref: 02DB98BA
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: 156628d9e5d5ce2273ab3088b1965299c53b152d68bd616ad5950a3d80ea9342
                                                          • Instruction ID: 1912db349024c1e3b9f2eb898a3027d202607ca795a5b7a5762da8e32ef41f9b
                                                          • Opcode Fuzzy Hash: 156628d9e5d5ce2273ab3088b1965299c53b152d68bd616ad5950a3d80ea9342
                                                          • Instruction Fuzzy Hash: 6F11F2B69002499FDB10CF9AC444BDEBBF4EB48324F04842EE516B7700C375A945CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(?,?,?), ref: 02DBFE9D
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: LongWindow
                                                          • String ID:
                                                          • API String ID: 1378638983-0
                                                          • Opcode ID: b416f52e142e3f96c39c9869e844f3441ba73a1574628f3ba64820c99c9c0ac5
                                                          • Instruction ID: 8f3878cf45819b5b9b400c2f2d9d094d99bc342dad214e7c5375b8e44ee7c082
                                                          • Opcode Fuzzy Hash: b416f52e142e3f96c39c9869e844f3441ba73a1574628f3ba64820c99c9c0ac5
                                                          • Instruction Fuzzy Hash: 8211E0B5900249CFDB20CF99D589BEEBBF4EB48324F10845AE859B7701C375A985CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: DispatchMessage
                                                          • String ID:
                                                          • API String ID: 2061451462-0
                                                          • Opcode ID: c1743c781774a2bb577d58f83c73f0f52d085ed6ffb66155a7da0798cd02d3b6
                                                          • Instruction ID: 592a44e3e241d2e09b81d73fc92caa9a0589bcde012c9faaf3f40e712c8571d4
                                                          • Opcode Fuzzy Hash: c1743c781774a2bb577d58f83c73f0f52d085ed6ffb66155a7da0798cd02d3b6
                                                          • Instruction Fuzzy Hash: 5E11E0B1D046498FDB10CF9AD948BDEBBF4AB48324F10862AD529A3250D378A945CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02DB962E
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 674ac91b44ee72112f53f5eabe4d8c60cd39f3fb8810221a7042b6dcb0fb94bf
                                                          • Instruction ID: 50319de2e6d56f27719aac653a5abf97ad41d88505955c5c8d064252e055b25c
                                                          • Opcode Fuzzy Hash: 674ac91b44ee72112f53f5eabe4d8c60cd39f3fb8810221a7042b6dcb0fb94bf
                                                          • Instruction Fuzzy Hash: 4B11DFB6D002898FDB10CFAAC444BDEFBF4AF89224F14842AD529A7700C374A945CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegCloseKey.KERNELBASE(00000000), ref: 0549642F
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID:
                                                          • API String ID: 3535843008-0
                                                          • Opcode ID: 387dc0d490847f82c2c6b4c5b23697665cfa28a322ebc5766e360cee2cd2f03f
                                                          • Instruction ID: 0cf35a61293867aa8920c6d339e8b4349bdae8dd3358fe5215329d427dc26dac
                                                          • Opcode Fuzzy Hash: 387dc0d490847f82c2c6b4c5b23697665cfa28a322ebc5766e360cee2cd2f03f
                                                          • Instruction Fuzzy Hash: 1F1130B19042488FCB20DF9AC489BEEBBF4EB88324F10842AD519B7640C774A945CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegCloseKey.KERNELBASE(00000000), ref: 0549642F
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID:
                                                          • API String ID: 3535843008-0
                                                          • Opcode ID: b0cc8a3897f961157193d0a84117c70c0783b1fc1aa2fd8c81963b7d9b818eb0
                                                          • Instruction ID: b4e7f39692b0f954ccbbba3eb56589164b90ced5b100d9e62c157a9f62abecec
                                                          • Opcode Fuzzy Hash: b0cc8a3897f961157193d0a84117c70c0783b1fc1aa2fd8c81963b7d9b818eb0
                                                          • Instruction Fuzzy Hash: 771112B1900248CFDB10DF9AD589BDEBBF4FB48324F10845AD519A7640C774A944CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(?,?,?), ref: 02DBFE9D
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.627213472.0000000002DB0000.00000040.00000001.sdmp, Offset: 02DB0000, based on PE: false
                                                          Similarity
                                                          • API ID: LongWindow
                                                          • String ID:
                                                          • API String ID: 1378638983-0
                                                          • Opcode ID: 08fced6062fc5bcce121b7fb6f2ca7123230684f4cf2ae0d889ed7d5cc6e323f
                                                          • Instruction ID: 5fc4c3467437ff8bf97c03fdf967aa5eb169a15b7a6a12b94db0e5fde762f54a
                                                          • Opcode Fuzzy Hash: 08fced6062fc5bcce121b7fb6f2ca7123230684f4cf2ae0d889ed7d5cc6e323f
                                                          • Instruction Fuzzy Hash: 601100B5900208CFDB10CF99D989BEFBBF8EB48324F10841AE819A7700C374A944CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.632444953.0000000005490000.00000040.00000001.sdmp, Offset: 05490000, based on PE: false
                                                          Similarity
                                                          • API ID: DispatchMessage
                                                          • String ID:
                                                          • API String ID: 2061451462-0
                                                          • Opcode ID: 94d6344d650fd85b7fd641feb4477012f0fd4c91c2853b719d64148bc1cd7585
                                                          • Instruction ID: a7ff90dffb357c9fff1c80dadf92c6b6531636ce0fd05474be5dc43dd45f7600
                                                          • Opcode Fuzzy Hash: 94d6344d650fd85b7fd641feb4477012f0fd4c91c2853b719d64148bc1cd7585
                                                          • Instruction Fuzzy Hash: 1311CEB1D046498FDB10DF9AD548BDEBBF4EB48324F10852AD429A3600D378A545CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.626222127.00000000011AD000.00000040.00000001.sdmp, Offset: 011AD000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f0a531c1cb7034ff46771f9f93c967e8c418b4397e86662fa27b21c602e6e90a
                                                          • Instruction ID: f48d00537145066980b3098de7f826b11870096aa3a226532faa83e21408c4bb
                                                          • Opcode Fuzzy Hash: f0a531c1cb7034ff46771f9f93c967e8c418b4397e86662fa27b21c602e6e90a
                                                          • Instruction Fuzzy Hash: 892136B9504600DFDF09CF54E8C0B26BF71FB88328F60C568E9054AA07C336D846CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.626306726.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 41fcfb30cac38968ad6809fcf7ff3e2c29356778bab968d66283a1ff45e4a664
                                                          • Instruction ID: 199172117af337daece1500a0fe7549303732841b1191242509c1983308cb049
                                                          • Opcode Fuzzy Hash: 41fcfb30cac38968ad6809fcf7ff3e2c29356778bab968d66283a1ff45e4a664
                                                          • Instruction Fuzzy Hash: 99212575608200DFDF1DCF54E4C0B66BB61FB88368F24C5ADD9094B246C336D847CA62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.626306726.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 55b4ba45f256770816f391d026369838773b34d2fd7e9bba1ddfe59a6ff268e4
                                                          • Instruction ID: aa1dbfea9e7abcd4e812ec6a0b443e51ca99460325f674cf894a1fb37a75c01a
                                                          • Opcode Fuzzy Hash: 55b4ba45f256770816f391d026369838773b34d2fd7e9bba1ddfe59a6ff268e4
                                                          • Instruction Fuzzy Hash: C02180755083809FCB06CF24D9D4B11BF71EB46214F28C5DAD8498F2A7C33AD856CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 0000001A.00000002.626222127.00000000011AD000.00000040.00000001.sdmp, Offset: 011AD000, based on PE: false
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b5d041c195b4e30d341d02aae4de4fdaf8836022265772e994b819b8081c2768
                                                          • Instruction ID: 5bb1760576ba0d5527c99bd21713068d7076008e3767f068d594a7feb31ef960
                                                          • Opcode Fuzzy Hash: b5d041c195b4e30d341d02aae4de4fdaf8836022265772e994b819b8081c2768
                                                          • Instruction Fuzzy Hash: CB11DF76904280CFCF06CF54D5C0B16BF71FB84324F2486A9D8454B617C336D456CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Non-executed Functions