Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241 (renamed file extension from 25241 to exe)
Analysis ID:344309
MD5:81956bb4f67d790e13cfd18f4cdd779b
SHA1:0bf781a6c1434d789f963d5dc76fdeae28cb01b4
SHA256:f2b321a162040b2990fe549349f00c9a60c2827ea0e82486f9c2c785d14d1462
Tags:NanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • dhcpmon.exe (PID: 5940 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 81956BB4F67D790E13CFD18F4CDD779B)
    • schtasks.exe (PID: 5328 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5920 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 81956BB4F67D790E13CFD18F4CDD779B)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 42 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 11 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, ProcessId: 5972, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe' , ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, ParentProcessId: 2140, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', ProcessId: 4144

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5972.5.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeReversingLabs: Detection: 30%
        Multi AV Scanner detection for submitted fileShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeVirustotal: Detection: 35%Perma Link
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeReversingLabs: Detection: 30%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJoe Sandbox ML: detected
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 11.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 127.0.0.1:4009
        Source: dhcpmon.exe, 0000000B.00000002.280060421.00000000015E7000.00000004.00000020.sdmpString found in binary or memory: http://go.mic
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222654499.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116A4D80_2_0116A4D8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116C6140_2_0116C614
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116EAD00_2_0116EAD0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116EAE00_2_0116EAE0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5E4805_2_01B5E480
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5E4715_2_01B5E471
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5BBD45_2_01B5BBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CC6146_2_054CC614
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CEAD06_2_054CEAD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CEAE06_2_054CEAE0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BE47111_2_031BE471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BE48011_2_031BE480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BBBD411_2_031BBBD4
        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\TrXHdHpWh.exe F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: TrXHdHpWh.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222257881.000000000060E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222654499.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.227420790.0000000006230000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.228213122.0000000006330000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.228213122.0000000006330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000004.00000002.220283276.000000000024E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594056626.00000000065F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.586649807.000000000103E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@14/9@0/2
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b4dbb526-0da4-4453-8602-b00f5f7a8285}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4900:120:WilError_01
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\dbtwNmbxuXxomvAczU
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5444:120:WilError_01
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7261.tmpJump to behavior
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeVirustotal: Detection: 35%
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile opened: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.265566275.0000000003081000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223203688.0000000002971000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: threadDelayed 3669Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: threadDelayed 5832Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: foregroundWindowGot 474Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: foregroundWindowGot 1353Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 464Thread sleep time: -49643s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 5440Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 3840Thread sleep time: -11990383647911201s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2412Thread sleep time: -52994s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4912Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5904Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222723335.0000000000DFF000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222723335.0000000000DFF000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'Jump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594354708.0000000006A6D000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592390913.0000000003859000.00000004.00000001.sdmpBinary or memory string: Program Manager88
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.589193315.000000000341E000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa#lh
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588827159.0000000003377000.00000004.00000001.sdmpBinary or memory string: Program ManagerD$#l
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading2Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344309 Sample: SecuriteInfo.com.Trojan.Gen... Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 44 127.0.0.1:4009 unknown unknown 2->44 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 12 other signatures 2->54 8 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 7 2->8         started        11 dhcpmon.exe 5 2->11         started        signatures3 process4 file5 30 C:\Users\user\AppData\Roaming\TrXHdHpWh.exe, PE32 8->30 dropped 32 C:\Users\...\TrXHdHpWh.exe:Zone.Identifier, ASCII 8->32 dropped 34 C:\Users\user\AppData\Local\...\tmp7261.tmp, XML 8->34 dropped 36 SecuriteInfo.com.T...72687.31999.exe.log, ASCII 8->36 dropped 13 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 1 9 8->13         started        18 schtasks.exe 1 8->18         started        20 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 8->20         started        22 schtasks.exe 1 11->22         started        24 dhcpmon.exe 2 11->24         started        process6 dnsIp7 46 127.0.0.1 unknown unknown 13->46 38 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->38 dropped 40 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 13->40 dropped 42 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 13->42 dropped 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->56 26 conhost.exe 18->26         started        28 conhost.exe 22->28         started        file8 signatures9 process10

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe35%VirustotalBrowse
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe35%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe35%VirustotalBrowse
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        11.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://go.mic0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpfalse
          high
          http://go.micdhcpmon.exe, 0000000B.00000002.280060421.00000000015E7000.00000004.00000020.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious

          Private

          IP
          127.0.0.1
          127.0.0.1:4009

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:344309
          Start date:26.01.2021
          Start time:12:23:54
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 12m 38s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241 (renamed file extension from 25241 to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:34
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@14/9@0/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.1% (good quality ratio 0.1%)
          • Quality average: 59.9%
          • Quality standard deviation: 18.1%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 98
          • Number of non-executed functions: 4
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          12:24:48API Interceptor1481x Sleep call for process: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe modified
          12:24:58AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          12:25:08API Interceptor1x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exePO-FRE590164.xlsxGet hashmaliciousBrowse
            C:\Users\user\AppData\Roaming\TrXHdHpWh.exePO-FRE590164.xlsxGet hashmaliciousBrowse

              Created / dropped Files

              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):781824
              Entropy (8bit):6.923780842614681
              Encrypted:false
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              MD5:81956BB4F67D790E13CFD18F4CDD779B
              SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
              SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
              SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Virustotal, Detection: 35%, Browse
              • Antivirus: ReversingLabs, Detection: 30%
              Joe Sandbox View:
              • Filename: PO-FRE590164.xlsx, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.log
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
              MD5:69206D3AF7D6EFD08F4B4726998856D3
              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
              MD5:69206D3AF7D6EFD08F4B4726998856D3
              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
              Malicious:false
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              C:\Users\user\AppData\Local\Temp\tmp7261.tmp
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1642
              Entropy (8bit):5.190572181064251
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBAtn:cbh47TlNQ//rydbz9I3YODOLNdq3k
              MD5:9B8DAE50683D5E82527A85241D18D23A
              SHA1:396D9BA714A271A35F2BDBD0191909C1B7B0B6AA
              SHA-256:485BA4B410561795E6DF09517400958D3930DFC35925C48C2F702DD11F57E812
              SHA-512:D33792805AFB31E5997FC12B5271D887EA2FB88475CB5AACC618819AD6E281E292E410875B06AE8F51199E611BE7F630FA0737A0344AC92FA4714E8CF5C0C98C
              Malicious:true
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1642
              Entropy (8bit):5.190572181064251
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBAtn:cbh47TlNQ//rydbz9I3YODOLNdq3k
              MD5:9B8DAE50683D5E82527A85241D18D23A
              SHA1:396D9BA714A271A35F2BDBD0191909C1B7B0B6AA
              SHA-256:485BA4B410561795E6DF09517400958D3930DFC35925C48C2F702DD11F57E812
              SHA-512:D33792805AFB31E5997FC12B5271D887EA2FB88475CB5AACC618819AD6E281E292E410875B06AE8F51199E611BE7F630FA0737A0344AC92FA4714E8CF5C0C98C
              Malicious:false
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ISO-8859 text, with no line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.75
              Encrypted:false
              SSDEEP:3:ud:ud
              MD5:28118F807F7A01BACBE5AB8F768230F2
              SHA1:923C85C167925A747D112AB236E7E0D35CD26AAF
              SHA-256:1436045EFE2197D379E927706C81950B8265DEA31BB5F03F0A49BB6CA6859342
              SHA-512:A3C676D01F0CE7FF931FE25F1C75E4DC6C7D1A43BDB5706288955FF2B2B43EF9B5ACC68B551794CA5C1E4D52D838E5B6D3B74B7FDEC58D50B40A8A4FE1FC683E
              Malicious:true
              Preview: k.8p8..H
              C:\Users\user\AppData\Roaming\TrXHdHpWh.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):781824
              Entropy (8bit):6.923780842614681
              Encrypted:false
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              MD5:81956BB4F67D790E13CFD18F4CDD779B
              SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
              SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
              SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Virustotal, Detection: 35%, Browse
              • Antivirus: ReversingLabs, Detection: 30%
              Joe Sandbox View:
              • Filename: PO-FRE590164.xlsx, Detection: malicious, Browse
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
              C:\Users\user\AppData\Roaming\TrXHdHpWh.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):6.923780842614681
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File size:781824
              MD5:81956bb4f67d790e13cfd18f4cdd779b
              SHA1:0bf781a6c1434d789f963d5dc76fdeae28cb01b4
              SHA256:f2b321a162040b2990fe549349f00c9a60c2827ea0e82486f9c2c785d14d1462
              SHA512:a6efb7cd565b2da0811a79c8eeab2d4dc470296a7eccb4badb21ddaf1add94ef3f2f02e2223212a19564137b08919434d65e8be99f1779e9dd475eb11443e9d7
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@................................

              File Icon

              Icon Hash:0000000000000000

              Static PE Info

              General

              Entrypoint:0x110a72be
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x11000000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x600EA984 [Mon Jan 25 11:20:36 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [11002000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xa726c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x19550.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xa52c40xa5400False0.682253746691data7.47933743717IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0xa80000x195500x19600False0.0550819735222data1.06100151007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0xa81a00x468GLS_BINARY_LSB_FIRST
              RT_ICON0xa86180x860PNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced
              RT_ICON0xa8e880x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
              RT_ICON0xab4400x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
              RT_ICON0xac4f80x10828dBase III DBT, version number 0, next free block index 40
              RT_ICON0xbcd300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
              RT_GROUP_ICON0xc0f680x5adata
              RT_VERSION0xc0fd40x37cdata
              RT_MANIFEST0xc13600x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightBharat Biotech (C) 2021
              Assembly Version48.0.31.9
              InternalNameEnumInt64TypeInfo.exe
              FileVersion48.0.31.09
              CompanyNameBharat Biotech
              LegalTrademarks
              CommentsBBV152
              ProductNameBBV152
              ProductVersion48.0.31.09
              FileDescriptionBBV152
              OriginalFilenameEnumInt64TypeInfo.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:12:24:46
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe'
              Imagebase:0x550000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223203688.0000000002971000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:12:24:49
              Start date:26/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
              Imagebase:0x1290000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:24:49
              Start date:26/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:24:50
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Imagebase:0x190000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:12:24:50
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Imagebase:0xf80000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:12:25:06
              Start date:26/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
              Imagebase:0xc70000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.265566275.0000000003081000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 35%, Virustotal, Browse
              • Detection: 30%, ReversingLabs
              Reputation:low

              General

              Start time:12:25:09
              Start date:26/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
              Imagebase:0x1090000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:25:10
              Start date:26/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:25:10
              Start date:26/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Imagebase:0xdf0000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >

                Executed Functions

                APIs
                • GetCurrentProcess.KERNEL32 ref: 0116BD90
                • GetCurrentThread.KERNEL32 ref: 0116BDCD
                • GetCurrentProcess.KERNEL32 ref: 0116BE0A
                • GetCurrentThreadId.KERNEL32 ref: 0116BE63
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: d864161a8848fc09aa0e357229f255d1149686a62db71b288df584887e6886b5
                • Instruction ID: e21ec965b953fbeb880fc566691d35d4908ace8539aec6502b105630eb7952cc
                • Opcode Fuzzy Hash: d864161a8848fc09aa0e357229f255d1149686a62db71b288df584887e6886b5
                • Instruction Fuzzy Hash: C95154B0A047488FDB14CFA9D6487AEBBF0EF88304F248499E019AB251CB745944CB65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetCurrentProcess.KERNEL32 ref: 0116BD90
                • GetCurrentThread.KERNEL32 ref: 0116BDCD
                • GetCurrentProcess.KERNEL32 ref: 0116BE0A
                • GetCurrentThreadId.KERNEL32 ref: 0116BE63
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: 57a5717a473c39f9fc9e265e4265244c9855bd78edac3cb43de7d542e2e999c6
                • Instruction ID: f474e265083179fbcf11225a64da7ad26ec0cda4402e6cbbdf26f7ef305c29c8
                • Opcode Fuzzy Hash: 57a5717a473c39f9fc9e265e4265244c9855bd78edac3cb43de7d542e2e999c6
                • Instruction Fuzzy Hash: 9A5152B0A047088FDB14CFA9D648BAEBBF4EB88304F208469E119AB351DB756944CB65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 01169C76
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 5742ae7d34a86597bfa6e1aa1d09d0128f06a028290fa677b65ca7a402ed2e6f
                • Instruction ID: 08d644012b8d2ac9e1b06a8599acbb696a489b616d0cca95597c15871545b069
                • Opcode Fuzzy Hash: 5742ae7d34a86597bfa6e1aa1d09d0128f06a028290fa677b65ca7a402ed2e6f
                • Instruction Fuzzy Hash: 28714970A00B058FDB28DF29D4417AABBF5FF88204F10892DD596DBA50DB75E815CF91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0116BFDF
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 5354f49b87ceb2adbefaab648511c12f3c3783e18fcd9165b4c5df2fafc532a0
                • Instruction ID: dfed4814961808febe6201a906c61587eac52153b1380dbdb5dfc213f850e19c
                • Opcode Fuzzy Hash: 5354f49b87ceb2adbefaab648511c12f3c3783e18fcd9165b4c5df2fafc532a0
                • Instruction Fuzzy Hash: 3F2105B5D002499FDB10CFA9D984AEEBBF4FF48320F14805AE914A7250D774AA45CF61
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0116BFDF
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 605625c309c10f687fff985e52550a1f05763b511cb2979150f467b03a488a92
                • Instruction ID: 8cdb11cae98fcc97f7db02f21211f9a3fce7ee156b6c84d0a53e44bfae433315
                • Opcode Fuzzy Hash: 605625c309c10f687fff985e52550a1f05763b511cb2979150f467b03a488a92
                • Instruction Fuzzy Hash: F521F5B59002489FDB10CFAAD984ADEBFF8FB48320F14805AE914B3310D775A954CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01169CF1,00000800,00000000,00000000), ref: 01169F02
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 6880db8c3919cd2fc5cfa3c631a69ef799deea0aa6fb63dd6b249b9e8531bb11
                • Instruction ID: c7504424707aa1b3f253660336c84dd4bfbd9fb5a9f88a658e2a194392779d68
                • Opcode Fuzzy Hash: 6880db8c3919cd2fc5cfa3c631a69ef799deea0aa6fb63dd6b249b9e8531bb11
                • Instruction Fuzzy Hash: 211114B29043488FDB14CF9AD844ADEFBF8EB88314F11846EE519B7200C775A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01169CF1,00000800,00000000,00000000), ref: 01169F02
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 9187cbfff4a9356a4f5e3e0dd0114f5c90310df5633bb6702eff99ed191a6d02
                • Instruction ID: b152456d50bde81802b6dc7ab7758f31093b668c00391a20c8453d2879fffcbe
                • Opcode Fuzzy Hash: 9187cbfff4a9356a4f5e3e0dd0114f5c90310df5633bb6702eff99ed191a6d02
                • Instruction Fuzzy Hash: 101144B28002488FCB10CFAAD444AEEFFF4EF88324F15846ED555A7200C775A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 01169C76
                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: d5c04777b9ac6152be1ee27209427f25f6c077fd64dda6bf849336faf96532cf
                • Instruction ID: 267cabc08b561f7f6c7b8ae1bc98fc0ab2020754d0280bc4d9b5ddcc167a4598
                • Opcode Fuzzy Hash: d5c04777b9ac6152be1ee27209427f25f6c077fd64dda6bf849336faf96532cf
                • Instruction Fuzzy Hash: B51110B2C006498FDB14CF9AD544BDEFBF8EB88224F10851AD429B7600C379A546CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222501241.0000000000BBD000.00000040.00000001.sdmp, Offset: 00BBD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8c275859849d7dd6855f07680559f3f0cdf310b6198b3c9b45a2f6f9be03af61
                • Instruction ID: a17e5a07c277c47e12ef1b2178f0763f209c8f4c1af219576481ae4867f82c9c
                • Opcode Fuzzy Hash: 8c275859849d7dd6855f07680559f3f0cdf310b6198b3c9b45a2f6f9be03af61
                • Instruction Fuzzy Hash: 35214871504240DFDB11DF14D8C0BB6BFA5FB98328F24C5A8E9090B246D37AD845CBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222546243.0000000000CDD000.00000040.00000001.sdmp, Offset: 00CDD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f0bfcc2d229d44770dd0c43d8b8dfd0953659998e2db1ce10a8c0183c1bd385c
                • Instruction ID: f58d2f49f77afe0f8c61005f237edd737869a8117af1d4afa34299f88433bf25
                • Opcode Fuzzy Hash: f0bfcc2d229d44770dd0c43d8b8dfd0953659998e2db1ce10a8c0183c1bd385c
                • Instruction Fuzzy Hash: AB21C575908240DFDB14DF24D9C4B26BBA5FB88314F24C56EEA0A4B346C736E846CA61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222546243.0000000000CDD000.00000040.00000001.sdmp, Offset: 00CDD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2515ca423bce78eca4e0a42f4c17a90a87069c3fade82eeb0e3bbee10fbc4f96
                • Instruction ID: 48a2cfdf2d6a57dbb0eaab45783449e5c04cd53b767750b1b05b01988890f830
                • Opcode Fuzzy Hash: 2515ca423bce78eca4e0a42f4c17a90a87069c3fade82eeb0e3bbee10fbc4f96
                • Instruction Fuzzy Hash: B2217F755093808FCB12CF24D990715BF71AB86314F28C5EBD8498B697C33A990ACB62
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222501241.0000000000BBD000.00000040.00000001.sdmp, Offset: 00BBD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction ID: f843ba45e686623d31ba83cbb67c220b9bd33d411af5745131309715eb9e467f
                • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction Fuzzy Hash: 5111D376504280CFCF12CF14D5C4B6ABFB1FB94324F28C6A9D8050B656C37AD85ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222501241.0000000000BBD000.00000040.00000001.sdmp, Offset: 00BBD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2327a5e757220f93165bc7a485bf7e8b6d57c108078ce592d95d1d66de06d467
                • Instruction ID: 44529c34456de85850ad7ccbdb4da5b290fb3518350d2e6edbc09c1d7c880d8d
                • Opcode Fuzzy Hash: 2327a5e757220f93165bc7a485bf7e8b6d57c108078ce592d95d1d66de06d467
                • Instruction Fuzzy Hash: 2B01D461509744ABE7108A27CCC47F6BBD8EF41328F28C499ED044A282EBBC9C44C6B1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222501241.0000000000BBD000.00000040.00000001.sdmp, Offset: 00BBD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e95c951a7d7342d6e7f6f73ed092b3b4ef57f361c3e13559e85ba3ee93f9af8b
                • Instruction ID: 7eb60a08a8991df79c600229a3bca9d71376bd9a2998de7c2bf4584ca23ad22b
                • Opcode Fuzzy Hash: e95c951a7d7342d6e7f6f73ed092b3b4ef57f361c3e13559e85ba3ee93f9af8b
                • Instruction Fuzzy Hash: 77F0C871405244ABE7108A16DC847B2FBDCDB81334F18C59AED044F242D3B89C44CAB0
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4f2a85fbb359509fe28fa7c9c7b4f2a61936dacb900b6852a4e117d51ffc956
                • Instruction ID: 73080eb8505bfb858c7ad235a59d2de28e4e7ede254c55739690f3a216a4e7cc
                • Opcode Fuzzy Hash: f4f2a85fbb359509fe28fa7c9c7b4f2a61936dacb900b6852a4e117d51ffc956
                • Instruction Fuzzy Hash: 9012B1B1411F46CAE710DF65FC983897BA1B745328B904308D261BBBF9D7B4214ACFA8
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3bb262b8f55855331c655bf322308dea09401b7ac63787a21cb6f3fd40e619ce
                • Instruction ID: 67e2a044841ab4693b773f59e092e142d404b3bfae9b13c74787f6125b9a4c8a
                • Opcode Fuzzy Hash: 3bb262b8f55855331c655bf322308dea09401b7ac63787a21cb6f3fd40e619ce
                • Instruction Fuzzy Hash: 90A18E36E0021ACFCF09DFB5C8445DEBBB6FF84300B15856AE905AB220EB72A955CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 61b94c5697a1649f4a2b7a7895ca7c8fb013472ce112f63ff58fd61817002409
                • Instruction ID: 6e19a47480cde8bd8e04f9809b23948c1da62362a4649c937136f0b9661a481f
                • Opcode Fuzzy Hash: 61b94c5697a1649f4a2b7a7895ca7c8fb013472ce112f63ff58fd61817002409
                • Instruction Fuzzy Hash: 03C107B1811B46CAD711DF65FC883897B61BB85328F604309D161BB7F8D7B4204ACFA4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.222891516.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e290504b3c7a2ea80157d388c599103748af8e316c0e16021da7c34a81bf9dd0
                • Instruction ID: 2509f4499a3bc43ff7b5e313c92b5ccf54081d4755ca428e85acf5e7b8ab2496
                • Opcode Fuzzy Hash: e290504b3c7a2ea80157d388c599103748af8e316c0e16021da7c34a81bf9dd0
                • Instruction Fuzzy Hash: E211261118D6E20BE3535A3414A34D5BFD1C89203476E25FC8ED14F1F3EA0AE44BD796
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID: %$l$ %$l$ %$l
                • API String ID: 0-3715886128
                • Opcode ID: 08037ae304aadf247731457b977ae54c4ac73947042d1087cdc9497f306f949b
                • Instruction ID: ac1022b8510730c10bb1693b47b4f04f1c1d1fa2af1bd18773b36d85dfacbab6
                • Opcode Fuzzy Hash: 08037ae304aadf247731457b977ae54c4ac73947042d1087cdc9497f306f949b
                • Instruction Fuzzy Hash: 00318C353057454BC705EB3084906ABB7A3AFD1258B29C86EC2468FB85EF75FC09C7A1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 01B5962E
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 6ece37847d58c494adc79cf25ef1a8fb8a4654a9e19ef63fd02bb4a6f11090e4
                • Instruction ID: 70bd73573f9da2bc0cd36b59d17e2ceef4793432c850c9133cd02c19ce30e3f6
                • Opcode Fuzzy Hash: 6ece37847d58c494adc79cf25ef1a8fb8a4654a9e19ef63fd02bb4a6f11090e4
                • Instruction Fuzzy Hash: 8B712870A00B058FDB68DF2AD44575ABBF5FF88218F108A6DD98AD7A50DB34E805CF91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 01B5FD0A
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 7240c167305415a47ad9b9f9d06ef6a8abef9c8b8131142d668af9ad516d54c7
                • Instruction ID: 180165d74d7292f1d5bc8c325207df2a129cc00971d3ba38ddc3eb77a9e2d442
                • Opcode Fuzzy Hash: 7240c167305415a47ad9b9f9d06ef6a8abef9c8b8131142d668af9ad516d54c7
                • Instruction Fuzzy Hash: 2D6101B1C04349AFCF06CFA9C884ADEBFB1BF49310F1581AAE918AB261D7349945CF50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 01B5FD0A
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 6a07fa154d1335babebecd822c4fe8c8ac85686e6c950ba8b1a0dea9e111c584
                • Instruction ID: a22f50d2f3b0816ee7735dd8e145aa564101075b462664afd1ce3e9ed30baab5
                • Opcode Fuzzy Hash: 6a07fa154d1335babebecd822c4fe8c8ac85686e6c950ba8b1a0dea9e111c584
                • Instruction Fuzzy Hash: 16519FB1D00309AFDB14CF99D884ADEFBB5FF48314F24826AE819AB250D7749945CF91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01B5BCC6,?,?,?,?,?), ref: 01B5BD87
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 1545e7a463be20f1a9988c66aed1facf8053f277adcc8990b10a1545f5b3e1f6
                • Instruction ID: 24e431c5f46d28054fd8e79c40a625e1e3caf39f042e0d91cc33d02638eb4770
                • Opcode Fuzzy Hash: 1545e7a463be20f1a9988c66aed1facf8053f277adcc8990b10a1545f5b3e1f6
                • Instruction Fuzzy Hash: DE41CD74940B45DFEB128FB0E989BBE3FB5EB89311F24426AEE059B281DB341901CF11
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01B5BCC6,?,?,?,?,?), ref: 01B5BD87
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 176af07b1b1b4ee78ce1b9b8882690d7ef67fa0d639829989ad6ee2d74248b7c
                • Instruction ID: 0d7472637268cf6300503281f79c914a8d329dfb9f685b19c31ea29497dcbb13
                • Opcode Fuzzy Hash: 176af07b1b1b4ee78ce1b9b8882690d7ef67fa0d639829989ad6ee2d74248b7c
                • Instruction Fuzzy Hash: 3621E5B5900248AFDB50CF99D984AEEBBF5EB48320F14805AE915A7350D778A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01B5BCC6,?,?,?,?,?), ref: 01B5BD87
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 8dd7d3de61cdf6916567424ddd9e47a0cfcfcbe872c54bedd103456ba1c15339
                • Instruction ID: f38d0bf74d43c1ba2bfc2421fafa21d23e88ea1191737b578de1a3d1bbced354
                • Opcode Fuzzy Hash: 8dd7d3de61cdf6916567424ddd9e47a0cfcfcbe872c54bedd103456ba1c15339
                • Instruction Fuzzy Hash: 3521E4B5D002489FDB10CFA9D984AEEBBF4EF48324F14845AE954B7351C778A944CF61
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01B596A9,00000800,00000000,00000000), ref: 01B598BA
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 322a03c8aad4192afab9175f46b5b767bc729fcd5605913fa13de464da7461ee
                • Instruction ID: 3bfaf8535efdf3ddb3e1a68950828be7a359713c6cb7aa9a1a8dc68fe489ba64
                • Opcode Fuzzy Hash: 322a03c8aad4192afab9175f46b5b767bc729fcd5605913fa13de464da7461ee
                • Instruction Fuzzy Hash: B81122B2800208DFDB14CF9AC444B9EBBF4EB48324F10842EE919A7600C778A945CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01B596A9,00000800,00000000,00000000), ref: 01B598BA
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: dae52baa58c75bdd717f9655812abf4bb4086b3a3e406e326694e3cac3e22321
                • Instruction ID: 988a2655659d4faac6ac027d6e67eaf4241c01a0f50228f1b25adccd73739198
                • Opcode Fuzzy Hash: dae52baa58c75bdd717f9655812abf4bb4086b3a3e406e326694e3cac3e22321
                • Instruction Fuzzy Hash: F111F2B2800209CFDB14CF9AD444ADEBBB4EB48324F14842ED919A7600C778A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 01B5962E
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 9fa146885cffdf177d10150118c78840720a968396239f4a3b36fd9c5f0a3418
                • Instruction ID: 5e50992a8deb7b9e48ebb549b3e8550a830d026f60100a596d539a762ec787d8
                • Opcode Fuzzy Hash: 9fa146885cffdf177d10150118c78840720a968396239f4a3b36fd9c5f0a3418
                • Instruction Fuzzy Hash: 5811E0B6C007498FDB14CF9AD444BDEFBF4EB88224F14856AD829A7600D778A549CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,01B5FE28,?,?,?,?), ref: 01B5FE9D
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: LongWindow
                • String ID:
                • API String ID: 1378638983-0
                • Opcode ID: ac0d782aef8c8dde7e3d707dff97d504761661576d8c330dbf86fe3394f6502c
                • Instruction ID: b076b0010881f2fbfab4b8740db74b1629ef2af32c66dae4f6036fa447170bf3
                • Opcode Fuzzy Hash: ac0d782aef8c8dde7e3d707dff97d504761661576d8c330dbf86fe3394f6502c
                • Instruction Fuzzy Hash: 991122B18002489FDB10DF99D588BEEFBF8EB48320F20845AE915A7301C374A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,01B5FE28,?,?,?,?), ref: 01B5FE9D
                Memory Dump Source
                • Source File: 00000005.00000002.588565274.0000000001B50000.00000040.00000001.sdmp, Offset: 01B50000, based on PE: false
                Similarity
                • API ID: LongWindow
                • String ID:
                • API String ID: 1378638983-0
                • Opcode ID: f6597d045fd81c0dc38f4d9f418470245f495d596a1156eb53a53c3f0133b954
                • Instruction ID: 709bbda2ef235cd6bc3bc330f44a8512f86bad679ddf74926535224677436660
                • Opcode Fuzzy Hash: f6597d045fd81c0dc38f4d9f418470245f495d596a1156eb53a53c3f0133b954
                • Instruction Fuzzy Hash: 421103B58003499FDB10CF99D585BDEFBF4EB48324F20845AE959A7341C774AA44CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID: h?l
                • API String ID: 0-593827334
                • Opcode ID: b7e8bd76b873911891495c793c6db1e216f0754f8b6645afea179c46c356e0a5
                • Instruction ID: 9e9e2d119348696c61ddf3af5b9034abdd431a0a703ef557cd569773504eb9be
                • Opcode Fuzzy Hash: b7e8bd76b873911891495c793c6db1e216f0754f8b6645afea179c46c356e0a5
                • Instruction Fuzzy Hash: 8B21D331B10614DFC744DB69D9849A9B7F5EF89324B2181AAE519CB362DB70EC06CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID: C%
                • API String ID: 0-1952537629
                • Opcode ID: 8b8141675f807f607128fc7ee6994f6706481eaf7ecb911d993cd8407a4294e5
                • Instruction ID: 5189dd38bd249ce8e812d0f474908433b8fc8fdf6cdcfa74933e620d6c3565fd
                • Opcode Fuzzy Hash: 8b8141675f807f607128fc7ee6994f6706481eaf7ecb911d993cd8407a4294e5
                • Instruction Fuzzy Hash: 90E08C71100A209BC350EB18E44094ABBE6FB8A244B04CE1ED62A8B741DFB1AC028B90
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID: C%
                • API String ID: 0-1952537629
                • Opcode ID: 039349736e1cb1bf612faa4e75b4e13ee32a58d08c34378dd700c05742a62972
                • Instruction ID: fa7019a83bd813587f32d3c949acfae3f1043b1bdbc133f5b801c59f05bc8915
                • Opcode Fuzzy Hash: 039349736e1cb1bf612faa4e75b4e13ee32a58d08c34378dd700c05742a62972
                • Instruction Fuzzy Hash: EFD017302006205B83A4EB28E44485AB7E6EB89618300CE5F911B9B741DBA1BD068BD0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23058395f121a7b8f497849ebd7951415e6ff9cdc14040b531e720612be9915a
                • Instruction ID: a19ae84a3ba3fb07b721072c69470dc605720209ff1bc03470fdcec7d9f15da4
                • Opcode Fuzzy Hash: 23058395f121a7b8f497849ebd7951415e6ff9cdc14040b531e720612be9915a
                • Instruction Fuzzy Hash: 90223770A00706CFCB54DF99C484AAEFBB2FF88314B25895AD456AB644DB30E981CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c43fdc7ee224ef0cf1feef2fd91cebbb42ad36327786a7749782881cb150fad
                • Instruction ID: af63f2e7f400e62591398a7ff2024213f598a719326085b3b669a750fd023679
                • Opcode Fuzzy Hash: 7c43fdc7ee224ef0cf1feef2fd91cebbb42ad36327786a7749782881cb150fad
                • Instruction Fuzzy Hash: FE919E70A003059FDB64EFA9C980AAEFBF5EF48310F11852BE4599B250D7B4E845CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57b0c179bd773a7eb95e1da61efdd6f8c0c5b79df88c91129d2245131216e4ea
                • Instruction ID: f951d417e69d8655d5483752ed858afb69493fabf232397c6a514bfb836a40cb
                • Opcode Fuzzy Hash: 57b0c179bd773a7eb95e1da61efdd6f8c0c5b79df88c91129d2245131216e4ea
                • Instruction Fuzzy Hash: 87915774A00706CFCB44DF55C584AAAFBB2FF88314F29C59AD416AB206C731E942CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 49cfcb38073f7bcd8c45cbaa95071622782c1640a8e26d4623480cb55340ad31
                • Instruction ID: e8fd9b0acab595f9ae8269d85a81d54dfe3c43a3f1fbff991c6e6af524b1851d
                • Opcode Fuzzy Hash: 49cfcb38073f7bcd8c45cbaa95071622782c1640a8e26d4623480cb55340ad31
                • Instruction Fuzzy Hash: 58714830A007049FDF94EB65C594BAAB7F2BF88210F14859AD416EB361DB72ED45CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 247981320bb85d32868c970a4933f94aafeccbe8bad32f812cba9f1ce5eaa9e7
                • Instruction ID: 9eb082e82a5452e138371dd3c62b1380951993c3f5833f8fd2df00f5dadf9b14
                • Opcode Fuzzy Hash: 247981320bb85d32868c970a4933f94aafeccbe8bad32f812cba9f1ce5eaa9e7
                • Instruction Fuzzy Hash: 7F5156B0E04348DFCB50EFA9C884BDEBBF5AF48314F15812AE509AB250DB749945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 618df289424c05bc6c3643d1ae7d4ec41886fdc42e747bf8d45df098f178b29d
                • Instruction ID: 715d86774f608c1afa3debb381e0c6108b8fcfaa698e1a2e860f5e57e508f895
                • Opcode Fuzzy Hash: 618df289424c05bc6c3643d1ae7d4ec41886fdc42e747bf8d45df098f178b29d
                • Instruction Fuzzy Hash: 445100B4D007188FDB54DFA9C884BDDBBB1AF48318F15812AE829BB350DB74A845CF95
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35918009f042506fd71b08fb7082b7222d221581a38d2c44ec50f22780d5c042
                • Instruction ID: 40366b8ecbc69170eed578f36c31645b544bd6a59cb851cd2f4c62083ffcfbb5
                • Opcode Fuzzy Hash: 35918009f042506fd71b08fb7082b7222d221581a38d2c44ec50f22780d5c042
                • Instruction Fuzzy Hash: 76510270D007188FDB54DFA9C884BDEBBB0AF48318F15812AE819BB350DB74A845CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5587ca50cbd3a34b444cba92cb7902733b5a12e339268dd8b16669ddd4099b7a
                • Instruction ID: c721a9c79efa928661a4831bc0fb3ecf1b1bd1e83f72876dfd28cb877ce7cdec
                • Opcode Fuzzy Hash: 5587ca50cbd3a34b444cba92cb7902733b5a12e339268dd8b16669ddd4099b7a
                • Instruction Fuzzy Hash: 2541F430610301CFD768EF69D90463A77F6FFC4304B19886ED5068B680EB36AE56CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 135f6e258b17bef9c2891f2655b1652696f15c67b3ceea92021c1788491b5568
                • Instruction ID: 34f922cf3721d504d8ced4f5f981822d13ed3b912851a22cee4e6028ed611b3f
                • Opcode Fuzzy Hash: 135f6e258b17bef9c2891f2655b1652696f15c67b3ceea92021c1788491b5568
                • Instruction Fuzzy Hash: D5310C30A05B50CEDBB8EF2AC8503A6B7F1AF85605F14C86E849BCBA50DB76B445CB40
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a435dfd2424fc9fcf3270a350f6d18b3c74b6a1c2200b426ff75daad7d3a2394
                • Instruction ID: a87a78eaadb661c5d1262be843384513d8d56db810af15c2fb437c45807d1a93
                • Opcode Fuzzy Hash: a435dfd2424fc9fcf3270a350f6d18b3c74b6a1c2200b426ff75daad7d3a2394
                • Instruction Fuzzy Hash: 313114B0D01248DFCF10DFAAD584ADEBFF5AF48314F24802AE819AB651DB349945CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0272d1d3c9448d47775dc10d14b40bf34d167d68b7d35068d8d6fabae72c7026
                • Instruction ID: 526eecfef407b855e7ef6b845cae122406f9bb2e8838c411a1e92ee1056f7750
                • Opcode Fuzzy Hash: 0272d1d3c9448d47775dc10d14b40bf34d167d68b7d35068d8d6fabae72c7026
                • Instruction Fuzzy Hash: 8F319F307003448FDB51EBA5C441AAAFBF2EF89644B14887EE506DB740DB36ED45CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 841a04de3d32f0f0706c810304369264bfe4c62138dd8bd66ada2d189f32e59f
                • Instruction ID: 747003a581e1b08197798f88e97f5729c0a25c0c7b00e18bef5c54ba4c2b41e3
                • Opcode Fuzzy Hash: 841a04de3d32f0f0706c810304369264bfe4c62138dd8bd66ada2d189f32e59f
                • Instruction Fuzzy Hash: 7E316D307003048FDB55EB75C445AAAFBF2AF89645B10893EE506DB750DB36E845CB91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0af40e9239aa70bffb78af591a1037af397bd5d847e97b94c6ab7d5ed5b5fe59
                • Instruction ID: bbae47db6abca00e3234565987c61103337ea9a73090cf21db82d0bbcc10853d
                • Opcode Fuzzy Hash: 0af40e9239aa70bffb78af591a1037af397bd5d847e97b94c6ab7d5ed5b5fe59
                • Instruction Fuzzy Hash: 6631B430614305CFE794EFB5D808A7A77B6FB84300F19486AD906E7784EB35AE55CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 263840b78096db8584cb148df00067184c7b1515b0f012472885a40c5b59e641
                • Instruction ID: 091dc49f7e36b7fabb4ab0fe1edce9e540852b927362babcd499427f3c1b6f6f
                • Opcode Fuzzy Hash: 263840b78096db8584cb148df00067184c7b1515b0f012472885a40c5b59e641
                • Instruction Fuzzy Hash: B83105B0D01248DFCF50DFAAC580ADEBBF5AF48354F24802AE419AB651DB749945CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ca9004e78d34eb684490c1e507ee9945f49420aaa948731c6e9217a500694963
                • Instruction ID: 38812a97660e945ae8e2c2c47ce08caa422903cc40b8e8333b85026687eed673
                • Opcode Fuzzy Hash: ca9004e78d34eb684490c1e507ee9945f49420aaa948731c6e9217a500694963
                • Instruction Fuzzy Hash: 55219A31B082249BDF95AB68C8046FEB7B2AF88711F10843BD506DB740DB769945CBF1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7282a76e28aa350959f1f52808ea4ec288abd0824497f5b8924d3d71ab7cf97c
                • Instruction ID: 1db8b1ab4342d0a213bf468017fd23f9d35478419fdbd1623ca8eb6e044e15f5
                • Opcode Fuzzy Hash: 7282a76e28aa350959f1f52808ea4ec288abd0824497f5b8924d3d71ab7cf97c
                • Instruction Fuzzy Hash: 1E215C30B143408FD745ABB6941D36EBBF2AF88605F14842AE016E7394DF389B01CB92
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 31f43ec5b0c2bb9feeefae241b67a3b20f2b572995eb1fa0d6dbd2f974c203e5
                • Instruction ID: f9811e9b0de569b3735fa15f242a2acf7eddaa02404234de3511ab19134684f0
                • Opcode Fuzzy Hash: 31f43ec5b0c2bb9feeefae241b67a3b20f2b572995eb1fa0d6dbd2f974c203e5
                • Instruction Fuzzy Hash: 4F316970D10309DFDB54DFA5D484AA9BBB1FF49314F24856AE406AB341DB72AC86CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e5ddbcea0d281e4735ef4f7ed157a0e5f03b594e23875edeabb30c83220121a0
                • Instruction ID: c81ad205a5e9bc992e158f900d615c91452a65f13650b6c97cb62b7422a5ec3a
                • Opcode Fuzzy Hash: e5ddbcea0d281e4735ef4f7ed157a0e5f03b594e23875edeabb30c83220121a0
                • Instruction Fuzzy Hash: 06215930B183408FD745ABB6941D36DBBF2AF88605F14842AE016E7794DF389B06CB92
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.588163632.00000000017FD000.00000040.00000001.sdmp, Offset: 017FD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d9fcf7fb2e38b1538ad18ebcacf32f7bcd632443fbdcdeadd5dd095d1eb39c91
                • Instruction ID: ba8be3d0108b2b23e74e5e1095d69594c3dcb105cd65af31a5afac3c0d1b068e
                • Opcode Fuzzy Hash: d9fcf7fb2e38b1538ad18ebcacf32f7bcd632443fbdcdeadd5dd095d1eb39c91
                • Instruction Fuzzy Hash: C321C1B1504240DFDB25DF94D8C0B67FB65FB88324F24C5ADEE094A346C336E856DAA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.588190816.000000000180D000.00000040.00000001.sdmp, Offset: 0180D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3db256e164367ff4af8a1acefd46b82d936c0f459353a2b9d038d5e5a354276a
                • Instruction ID: ba636e04ee2cd013237e2d78e8cc9044fa3dd86075995654e731bf49283a4e5d
                • Opcode Fuzzy Hash: 3db256e164367ff4af8a1acefd46b82d936c0f459353a2b9d038d5e5a354276a
                • Instruction Fuzzy Hash: 6E210371504248DFDB52DF94DCC0B16BB65EB84358F24C669D80D8B286C736D946CA61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a0699e913b55fd953948d378d12dc493a958cc93b7205db04befb726633c096e
                • Instruction ID: 746fe76d1975792281e5f5b0116efb4c9393e9363bd6fb30728ca162e4179ffd
                • Opcode Fuzzy Hash: a0699e913b55fd953948d378d12dc493a958cc93b7205db04befb726633c096e
                • Instruction Fuzzy Hash: EF11C131308604ABC354A739E09056EB7BB9FC4618B548C6ED10F8B680EF72EC428BE1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e34231d90d1eebabcdd45f4885446c6f19bd0b10a7a94ea9d036991c781a038d
                • Instruction ID: 7f57c1c7381811bd1da74b1ebe95765cefc2f53c0a00148c496168c13f4637e4
                • Opcode Fuzzy Hash: e34231d90d1eebabcdd45f4885446c6f19bd0b10a7a94ea9d036991c781a038d
                • Instruction Fuzzy Hash: B4116D74304701AFD7A4EB55C9C0D2AF3ABEFC8264F54C51AD45A8BA50CB31EC52CA90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c48d37eed1d48ae9342f398ab2af558ef85d633736f7f5cc454e8f15c042ca6b
                • Instruction ID: 1743e7890b5acb6789ba8a067b836f86856070a8262c53b25fe2ff73d402b206
                • Opcode Fuzzy Hash: c48d37eed1d48ae9342f398ab2af558ef85d633736f7f5cc454e8f15c042ca6b
                • Instruction Fuzzy Hash: C0115171E04219DFDB50EFA4C8856AEBBF5EF49304F01816AD209AB611E7719A84C7E1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.588163632.00000000017FD000.00000040.00000001.sdmp, Offset: 017FD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction ID: 1950f219600030581ed12906c683fd78216c7aa371078a7e4c48f435b4d78240
                • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction Fuzzy Hash: DF118C76404280CFDB12CF54D5C4B66BF61FB84224F2886A9D9494A656C336E45ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.588190816.000000000180D000.00000040.00000001.sdmp, Offset: 0180D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4676951a6f3742d0ee41557564238a877822e21330454799e2497e13120bab7e
                • Instruction ID: e1547528884448e19b83647553fb2075d98e268d2939042093d035a3da4b6846
                • Opcode Fuzzy Hash: 4676951a6f3742d0ee41557564238a877822e21330454799e2497e13120bab7e
                • Instruction Fuzzy Hash: B011BE75504284CFCB12CF94D9C4B15BB61FB44324F28C6A9D8098B696C33AD54ACB62
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d6c5d46f503e65c45dbf1b7d3cbc37891bf6727124e98a2d981dc41d8ff5948a
                • Instruction ID: 1bcc6378cd495d432947dd1cc5b5c8c02aed9cd9b111c705adb850b368adc636
                • Opcode Fuzzy Hash: d6c5d46f503e65c45dbf1b7d3cbc37891bf6727124e98a2d981dc41d8ff5948a
                • Instruction Fuzzy Hash: D311E3B0600391AFD3619B28D54AB267BF6FB49308F11889DE056CB351DB39AD84CFE0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d3652fee4f8bdf02d0fd4720d58ffd05dbf451b4f700932a1c9b1cb825b1a879
                • Instruction ID: f9d75e04ae78a5ff55bdec1a9daa99b90b6fc61104522d2d5bc9a463b87c65fe
                • Opcode Fuzzy Hash: d3652fee4f8bdf02d0fd4720d58ffd05dbf451b4f700932a1c9b1cb825b1a879
                • Instruction Fuzzy Hash: 14F0A431711254ABC7142BB9A909A7F7BEEEB8DA11704583EF90AD7700EE75AC0187A0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d53a45d5637de1ac176fd52bf1f98f1a56add387b44506a722922b73246ae33
                • Instruction ID: 3cc64bd49492f6be5b8ec18c4bf132a948f413dba1eefcd2bb42cae8b5fdb9ad
                • Opcode Fuzzy Hash: 1d53a45d5637de1ac176fd52bf1f98f1a56add387b44506a722922b73246ae33
                • Instruction Fuzzy Hash: 5101F5B06043D0AFD3129B28E14A7257FF6FB4A318F14589DD045CB252CB799D84CBE0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a3545e41182c9be61abfb8e77569d8aaced39c51d849294f3e82c35f9335b73d
                • Instruction ID: f9e527aac49040b5630fe3cacb7e36eb4012b9551a1dcb132b212ff90121fdcc
                • Opcode Fuzzy Hash: a3545e41182c9be61abfb8e77569d8aaced39c51d849294f3e82c35f9335b73d
                • Instruction Fuzzy Hash: 72F09671710254AF871467B9A94D97F7AEEEB8C651314483EF50BE7700DE359C0187E0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d68caf1f442df38bbf2a0022136d77fb034fdaa7fe548085b4400fc49c4af035
                • Instruction ID: 2189309be469d30a047f80ceed29069e52bdc1b20d777f9427f083e42490507e
                • Opcode Fuzzy Hash: d68caf1f442df38bbf2a0022136d77fb034fdaa7fe548085b4400fc49c4af035
                • Instruction Fuzzy Hash: 7FE0EC33B083505AEF61365DA8487BBAA4597C4235F450277D90ECB3418751484442E0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a10149c995826f9c4d8ce8b59c7218fa85e089285f4aeb86f91b9d450a7d7b0c
                • Instruction ID: 70f6bacd34833cafd43842f28128f17d8ab30b6b75b6a8574436e9b318707d8b
                • Opcode Fuzzy Hash: a10149c995826f9c4d8ce8b59c7218fa85e089285f4aeb86f91b9d450a7d7b0c
                • Instruction Fuzzy Hash: 71F06236600A049F8364DA6AE444C57F7FAEFC9625315C96AE59EC7B24D630F8058A60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4aa3bc25e7e147b0564f7514137b1e16fa4195a959751cd745125572f44541d
                • Instruction ID: 3b31f43709be4fbefb31ed464d9a536c0f493c4eaab7113e09c5c48334c33f07
                • Opcode Fuzzy Hash: f4aa3bc25e7e147b0564f7514137b1e16fa4195a959751cd745125572f44541d
                • Instruction Fuzzy Hash: 35E02B356147106BC754F788D450A6BB765DBC9A64B00C42FD10AC7700DF72DD0287D0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 82cdb872e16fb046621716290d31146d892e39027d901acff806176a3677d5b0
                • Instruction ID: 14b261f5448b12e2c57b2082be79a1cb925b2726a5f1a7be7a0e977fbafbda96
                • Opcode Fuzzy Hash: 82cdb872e16fb046621716290d31146d892e39027d901acff806176a3677d5b0
                • Instruction Fuzzy Hash: 11E02231308224AFD3002324E11436837B9EB9F610F01409BD54ACB222CF204C00C3D2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7acebf4740b5d5b0ef8211a87f573e7d3cbfe14fc53648c73ce451f42d9ac0f
                • Instruction ID: eff8d5d215f53e4cc5c20ec5df5d29b7d17da0f1412edf9c9d22959c47ff377e
                • Opcode Fuzzy Hash: e7acebf4740b5d5b0ef8211a87f573e7d3cbfe14fc53648c73ce451f42d9ac0f
                • Instruction Fuzzy Hash: DFE0DF356187106F4A95E258981082FB7AACBC1964341C82FD10ACB740EF62ED0287D0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3ee8c69827e6377f5fbb15b06e9c213c313f0057537774f2d55daa9d3d3821a
                • Instruction ID: 3d41ee4b20c3b97f50a2a24926674cf57bf65fcaa9720d4de18217c10ed7b6a7
                • Opcode Fuzzy Hash: b3ee8c69827e6377f5fbb15b06e9c213c313f0057537774f2d55daa9d3d3821a
                • Instruction Fuzzy Hash: E1D05E31319220BF57847268D2549A973BEAB8EA64B4040ABD65ADB310DF526C04C3D6
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 706c44428d431fd60b841de8229f89b3d0e1f4b2ea9d507d8fc26096d7372589
                • Instruction ID: 46afbc682aa1a539e03ebeb23e217d815c892d487e24618b5045a42ee0a253ae
                • Opcode Fuzzy Hash: 706c44428d431fd60b841de8229f89b3d0e1f4b2ea9d507d8fc26096d7372589
                • Instruction Fuzzy Hash: 8CE0867110E7C14FE3639720EE16F553F3C9B16201F5980DBDD40860A3EB595919C7A7
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8214214b6aad7235f22fb889b2d95411ddc401c53179d45234ca284ce560da29
                • Instruction ID: 599709c7106c33c9ce3b7c23520f49365651d7484f60678fec0ccb8d92e3b933
                • Opcode Fuzzy Hash: 8214214b6aad7235f22fb889b2d95411ddc401c53179d45234ca284ce560da29
                • Instruction Fuzzy Hash: 1DD05E3010A708DFEB446B60E15832673B4FB08708B64886AE00FC7301CB33E9138AD0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 430ebd97b218077f2968cb11c0e5de3de1f3399b0796416360ea702e3fa69809
                • Instruction ID: ebe2f5beb77f546e4eb770e7ed7e114283f1564842b1048b6ddfc981ed280676
                • Opcode Fuzzy Hash: 430ebd97b218077f2968cb11c0e5de3de1f3399b0796416360ea702e3fa69809
                • Instruction Fuzzy Hash: 6BD0C934109344DF9F446A60D0185267774A64470432484AAA40FCB301D733E8128AC0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: adaa83e992f58bc6bfb6b32a215b09c15c37053c70da07604c8abe85ec254549
                • Instruction ID: fb918f5c22e1d1d2104aabec4d474079f42e5b5c029a8bd9c07aad66810e02ff
                • Opcode Fuzzy Hash: adaa83e992f58bc6bfb6b32a215b09c15c37053c70da07604c8abe85ec254549
                • Instruction Fuzzy Hash: 6CC08C668486480BCA4433F0E90A30EBA9C4B40006FC80059AA1AE2B42EE29852002A8
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3c05850eb4fa80c123f6b9ab607a45d75ab8ecddcf7042266ce39a98eeac9f5
                • Instruction ID: e3c0a72605ba070c4405e29a8090b3e27ae127d90d518325251322562e9daf0a
                • Opcode Fuzzy Hash: b3c05850eb4fa80c123f6b9ab607a45d75ab8ecddcf7042266ce39a98eeac9f5
                • Instruction Fuzzy Hash: C4C04C76A041098EEF145BD4F4453ECBB74F78436AF104067E61D92441C775196547D1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ccb812a9d3c1e3bc80690b87b4c8e63e79ba4d7512aa8ae29bac9a2f39995712
                • Instruction ID: 073a76ac32ef7a88b469d3f9091439ac0ded3bea33f8951c1eb600e8c08ba391
                • Opcode Fuzzy Hash: ccb812a9d3c1e3bc80690b87b4c8e63e79ba4d7512aa8ae29bac9a2f39995712
                • Instruction Fuzzy Hash: C0C09BB4110555DFDF155F51E2467643775FB49345F505458D00145512CF75454BC744
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 235aa6037bf66eb2173b8f856d151aae9e2624a5e6874259bf565a9dcec57779
                • Instruction ID: 3fc8782ba806f4e47c0282c76d5fb82b118b41db4c3716ece300a03d0fed483a
                • Opcode Fuzzy Hash: 235aa6037bf66eb2173b8f856d151aae9e2624a5e6874259bf565a9dcec57779
                • Instruction Fuzzy Hash: C8B09B7000D744DF53717B11DB06D99763DD6015017548415D60142155DF656B1445E5
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000005.00000002.594402683.0000000006AA0000.00000040.00000001.sdmp, Offset: 06AA0000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b98ebbcfcfb02958bd1c7da3dc9c22d2acfedb4c32c5894b82d1da2f6d200f92
                • Instruction ID: 1a6af4fd710bc5ba295cc1bf3f87430fc1d85f58226f0169a42b9153e11241fc
                • Opcode Fuzzy Hash: b98ebbcfcfb02958bd1c7da3dc9c22d2acfedb4c32c5894b82d1da2f6d200f92
                • Instruction Fuzzy Hash: 65B0123455870C474D8833F1650D21D768C0E400063C00159F51EA37409F39552000A1
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 054C9C76
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 7929a473e9f2b2076ffd34fcab1fecffaa246f8bce3267a57d542b9c26de0aad
                • Instruction ID: a66bca4eaf76326159a85643b36c0b96dd7057b6751842277f863023ade6d097
                • Opcode Fuzzy Hash: 7929a473e9f2b2076ffd34fcab1fecffaa246f8bce3267a57d542b9c26de0aad
                • Instruction Fuzzy Hash: 04713374A00B059FD7A4DF2AD4457AABBF1BB88304F1089AED54AD7B40EB35F805CB91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,054CBF1E,?,?,?,?,?), ref: 054CBFDF
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: db3a7150aa6c4d1fb0277370e62ef98d5c0601ec4aec0b85becf7ce3986147fd
                • Instruction ID: 989c0ef6d2247539412e264bef14195fdd38016ffdd8c67dd692a6ddc223e476
                • Opcode Fuzzy Hash: db3a7150aa6c4d1fb0277370e62ef98d5c0601ec4aec0b85becf7ce3986147fd
                • Instruction Fuzzy Hash: AB2116B59002489FCB10CFA9D884AEEBFF4FB48314F14805AE915B3310D774A954CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,054CBF1E,?,?,?,?,?), ref: 054CBFDF
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 9b1bd3b4b58a9761ab86f5fe23ad97ef9cc2817196b3fa2b4142c9aa4cbe68c8
                • Instruction ID: df9f3ca77ee12be7a0afdc4fa4ac378d20ffd794eb2d2fd3d2ec7c8f915ff67e
                • Opcode Fuzzy Hash: 9b1bd3b4b58a9761ab86f5fe23ad97ef9cc2817196b3fa2b4142c9aa4cbe68c8
                • Instruction Fuzzy Hash: 0821E6B59002489FDB10CFA9D884AEEBFF8FB48314F14845AE915B3310D774A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,054C9CF1,00000800,00000000,00000000), ref: 054C9F02
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: b124dafa43b714374def2a3f7fc277593b82d3258d02a78e71eef05f3a3844c0
                • Instruction ID: c8b78a8ea13e9580a5f7171cf0285ff20331a391096f251423138e6eca36461b
                • Opcode Fuzzy Hash: b124dafa43b714374def2a3f7fc277593b82d3258d02a78e71eef05f3a3844c0
                • Instruction Fuzzy Hash: 511114B69043499FCB10CFAAD444ADEFBF4EB98314F10846EE519A7300C775A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,054C9CF1,00000800,00000000,00000000), ref: 054C9F02
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 2c0bf9d4879403f867b60fd831941536bbd2b1f179545c1aa46bb134e7a994d8
                • Instruction ID: d20c612ea3c2e8c06c070c814f27bd3ff887ed8afe987d331b1fced477d7916e
                • Opcode Fuzzy Hash: 2c0bf9d4879403f867b60fd831941536bbd2b1f179545c1aa46bb134e7a994d8
                • Instruction Fuzzy Hash: 901144BA8042489FCB10CFA9D544AEEBBF4AF88324F14846EE419B7700C775A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 054C9C76
                Memory Dump Source
                • Source File: 00000006.00000002.267173012.00000000054C0000.00000040.00000001.sdmp, Offset: 054C0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 06b21491580ef5786a56112fc3ee1c18a095657f0c758469ed80b4c1a9714c06
                • Instruction ID: ba377c2eb45b41785a66488ed828b279bd5a606294df136be2718af513619df4
                • Opcode Fuzzy Hash: 06b21491580ef5786a56112fc3ee1c18a095657f0c758469ed80b4c1a9714c06
                • Instruction Fuzzy Hash: E0110FB6C006498FCB10CFAAC484ADEFBF4AB88324F10849AD429B7600C378A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000006.00000002.264903899.00000000011DD000.00000040.00000001.sdmp, Offset: 011DD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f73c11fec5c320f0b47864235ede7b30454c8478b8a41e9d67520b9fe9837dcc
                • Instruction ID: a3d6e8213b95eb3fab3142f65f5d01d8332a5a49c93bc8b7952335ca3b06924e
                • Opcode Fuzzy Hash: f73c11fec5c320f0b47864235ede7b30454c8478b8a41e9d67520b9fe9837dcc
                • Instruction Fuzzy Hash: DD2128B1504240EFDF09DF94E8C0B66BB65FB84324F24C569E9094B687C736E846C7A2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000006.00000002.264903899.00000000011DD000.00000040.00000001.sdmp, Offset: 011DD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction ID: 550538fa87c6621dda10b822b91cceeb3572b453e6b6d02f75452acea4319783
                • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction Fuzzy Hash: F811AF76404280DFCF16CF54E5C4B56BF71FB84324F28C6A9D8490BA56C33AE45ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000006.00000002.264903899.00000000011DD000.00000040.00000001.sdmp, Offset: 011DD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0eaba4492cd06947a27549d042ffe2e182300f11ccf1c967e3341bd90219d429
                • Instruction ID: e27c5a880b57ea861cb4b8b929c2f9a6556f9b62bc45a85af3a27904cf9daeb4
                • Opcode Fuzzy Hash: 0eaba4492cd06947a27549d042ffe2e182300f11ccf1c967e3341bd90219d429
                • Instruction Fuzzy Hash: 6D01F771408BC4AAEB184A65ED847A7FB98EF4122CF1AC499ED044A2C3C7789844C6B2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000006.00000002.264903899.00000000011DD000.00000040.00000001.sdmp, Offset: 011DD000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 985dcd259daa675169ac288e384825f78079eecd11a40c4fc8578dfd9c08e22a
                • Instruction ID: e8eaf57fd7bc92f1a2d42094d778848a98bc50589a52f8c9a9721823b692359d
                • Opcode Fuzzy Hash: 985dcd259daa675169ac288e384825f78079eecd11a40c4fc8578dfd9c08e22a
                • Instruction Fuzzy Hash: 6DF068714047849AEB158A19DD84766FF98EB41678F18C55AED085B287C3789844CA71
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Executed Functions

                APIs
                • GetCurrentProcess.KERNEL32 ref: 031BB730
                • GetCurrentThread.KERNEL32 ref: 031BB76D
                • GetCurrentProcess.KERNEL32 ref: 031BB7AA
                • GetCurrentThreadId.KERNEL32 ref: 031BB803
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID: 0TI~
                • API String ID: 2063062207-752617894
                • Opcode ID: cd14a05968b821b59bd9abd1bb8ffacb259491335c4a342205ae5922d9f6e007
                • Instruction ID: 3b4d2f3f8f11da71f9b67d2477198856cce8cbb36212ac56c0dd24c77e37c0fd
                • Opcode Fuzzy Hash: cd14a05968b821b59bd9abd1bb8ffacb259491335c4a342205ae5922d9f6e007
                • Instruction Fuzzy Hash: 025194B09057488FDB10CFA9C688BDEBBF0AF4D304F24845AE019B7790CB749884CB65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetCurrentProcess.KERNEL32 ref: 031BB730
                • GetCurrentThread.KERNEL32 ref: 031BB76D
                • GetCurrentProcess.KERNEL32 ref: 031BB7AA
                • GetCurrentThreadId.KERNEL32 ref: 031BB803
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: Current$ProcessThread
                • String ID: 0TI~
                • API String ID: 2063062207-752617894
                • Opcode ID: 5e981b48c4c6b85ee4ea7c87334baf81510aab8618c10a72528697b40570d786
                • Instruction ID: a983cd98bba810d6ae26d49db5f9d7f23fa32654071f5c2e13db2308652e8169
                • Opcode Fuzzy Hash: 5e981b48c4c6b85ee4ea7c87334baf81510aab8618c10a72528697b40570d786
                • Instruction Fuzzy Hash: 765164B09016488FDB14CFAAD688BDEBBF0AF4D314F248559E019B7790CB74A885CF65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031BFD0A
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: CreateWindow
                • String ID: 0TI~$0TI~
                • API String ID: 716092398-3224775205
                • Opcode ID: b184720148173e7f48889328767090be43a811d2dc782026feda9c7c0c43ba3a
                • Instruction ID: a363c4577685db26cdd4e0cad0f4db052086d3500a9392adbb5821fec9fe12bd
                • Opcode Fuzzy Hash: b184720148173e7f48889328767090be43a811d2dc782026feda9c7c0c43ba3a
                • Instruction Fuzzy Hash: 73610275C04249AFCF11CFA9D980ADEBFB5FF48304F29816AE818AB221D7759945CF50
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031BFD0A
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: CreateWindow
                • String ID: 0TI~$0TI~
                • API String ID: 716092398-3224775205
                • Opcode ID: 6d31425a515aae0f10609ebf2e374e72a29daf8bc2a3d08887ea1fe0eda6c7d2
                • Instruction ID: 878b65d8480bcaf892edf9969e19e7ce0c751c926028fc6f7dd7db1818aded89
                • Opcode Fuzzy Hash: 6d31425a515aae0f10609ebf2e374e72a29daf8bc2a3d08887ea1fe0eda6c7d2
                • Instruction Fuzzy Hash: 7441B3B1D003499FDB14CF99D884ADEFBB5BF48354F64812AE419AB210D7749945CF90
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 031B962E
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID: 0TI~
                • API String ID: 4139908857-752617894
                • Opcode ID: 0c24ad10b1461e6be2aa2a8198162128cdf9844e823d8a2172b6c6e29e41be84
                • Instruction ID: cb5b206546522f07cb170252d50b6f5aaac8c0526f009b963685142482c2cbb4
                • Opcode Fuzzy Hash: 0c24ad10b1461e6be2aa2a8198162128cdf9844e823d8a2172b6c6e29e41be84
                • Instruction Fuzzy Hash: 9E7156B0A00B058FD724DF2AD54179ABBF5BF89204F048A6DD58ADBA50DB34E846CB91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031BBD87
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID: 0TI~
                • API String ID: 3793708945-752617894
                • Opcode ID: fadd1868c13c75896a708bb23f133760dd3c213bc5de417cc683e70165098f11
                • Instruction ID: 8af1b5ac006d13902a54c271b04f9b8f1d7919cd92aa2430d27b7ffc35d1dee8
                • Opcode Fuzzy Hash: fadd1868c13c75896a708bb23f133760dd3c213bc5de417cc683e70165098f11
                • Instruction Fuzzy Hash: 9D21C4B59002489FDB10CFAAD984ADEBBF4EB48324F14841AE958B7310D778A944CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031BBD87
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: DuplicateHandle
                • String ID: 0TI~
                • API String ID: 3793708945-752617894
                • Opcode ID: dd747bd897adce64777959bd5f602e2e5ca698a7a6d05e40ef08d5f951b0f47b
                • Instruction ID: 8358afb974d73556c6173555c3a0a0e4cd58bd0801acc856780dae90e48f1027
                • Opcode Fuzzy Hash: dd747bd897adce64777959bd5f602e2e5ca698a7a6d05e40ef08d5f951b0f47b
                • Instruction Fuzzy Hash: 4221E4B59002489FDB10CFA9D984BDEFBF4BB48314F14841AE958B3750C378AA44CF65
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031B96A9,00000800,00000000,00000000), ref: 031B98BA
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID: 0TI~
                • API String ID: 1029625771-752617894
                • Opcode ID: f786d4d7a8be87c1efecab06e9bb36f24c0e74ea4e5492a0eadff4e52f52ca71
                • Instruction ID: 067fb951794be434e3a9f695366e8db9fe2fbcfa6a8b555ef3233c2e49b92ffb
                • Opcode Fuzzy Hash: f786d4d7a8be87c1efecab06e9bb36f24c0e74ea4e5492a0eadff4e52f52ca71
                • Instruction Fuzzy Hash: B41103B69002499FCB10CF9AD444BDEFBF4EB48314F14842EE519B7600C779A945CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031B96A9,00000800,00000000,00000000), ref: 031B98BA
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: LibraryLoad
                • String ID: 0TI~
                • API String ID: 1029625771-752617894
                • Opcode ID: 8e6156d9eac569177d9e0bf08ce2e8a11c17d54e1aa81222f4136f8af22b7405
                • Instruction ID: a1db98bb08538036ae1ec5d5b1bbd15af78dff5e98d5be6431016fbeacace12e
                • Opcode Fuzzy Hash: 8e6156d9eac569177d9e0bf08ce2e8a11c17d54e1aa81222f4136f8af22b7405
                • Instruction Fuzzy Hash: E711F2B68002498FDB10CFAAD944BDEBBF4AB48314F14842ED519A7600C779A546CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 031B962E
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: HandleModule
                • String ID: 0TI~
                • API String ID: 4139908857-752617894
                • Opcode ID: 4b9dd023b980dc96b4dbcebfedc238d8178b64f1a20c72598c1ae564cb9da411
                • Instruction ID: 16debdb2917f0673174683ffb90bfb22e2e964a46e667268210e7be7a12a3a9d
                • Opcode Fuzzy Hash: 4b9dd023b980dc96b4dbcebfedc238d8178b64f1a20c72598c1ae564cb9da411
                • Instruction Fuzzy Hash: 6011E0B6C006498FCB10CF9AD444BDEFBF4AF89324F14851AD529B7600C778A546CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetWindowLongW.USER32(?,?,?), ref: 031BFE9D
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: LongWindow
                • String ID: 0TI~
                • API String ID: 1378638983-752617894
                • Opcode ID: dcf2f20db90d5f72e03e469c32b5d25de731d17da3795fc253d74887b669f778
                • Instruction ID: b86406363fb1cbbbb37522efebe740194e17e098f98a9d5b851075084e4d20c6
                • Opcode Fuzzy Hash: dcf2f20db90d5f72e03e469c32b5d25de731d17da3795fc253d74887b669f778
                • Instruction Fuzzy Hash: 4F1125B5800249CFDB10CF99D585BEEBBF4EB48324F20841AE858B7601C378A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SetWindowLongW.USER32(?,?,?), ref: 031BFE9D
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.280353438.00000000031B0000.00000040.00000001.sdmp, Offset: 031B0000, based on PE: false
                Similarity
                • API ID: LongWindow
                • String ID: 0TI~
                • API String ID: 1378638983-752617894
                • Opcode ID: 785dcc4940cf2d83a9c8cdcf93f98ab9f9a1fad7b5ae020f57fe93286a72c981
                • Instruction ID: 6995b80dfdf580d3620d898f3f31db03178ca76844f4fd1c2ef522f6a3b6a51f
                • Opcode Fuzzy Hash: 785dcc4940cf2d83a9c8cdcf93f98ab9f9a1fad7b5ae020f57fe93286a72c981
                • Instruction Fuzzy Hash: DC1103B58002488FDB10CF9AD585BDEBBF8EB48324F20841AD918B7301C374A945CFB1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000B.00000002.280162178.000000000306D000.00000040.00000001.sdmp, Offset: 0306D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 31632e8444137f32ace762df7717eef614d401cbd1dc323789608cf5160960bd
                • Instruction ID: 733003ff5f1c467f83290131963a9f96fc96ba73516363a5c80121db0199b32f
                • Opcode Fuzzy Hash: 31632e8444137f32ace762df7717eef614d401cbd1dc323789608cf5160960bd
                • Instruction Fuzzy Hash: 42213A71604240DFDF11DF54D8C0B2ABFA5FB88328F24C5A9E9094B64AC336D845C7A2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000B.00000002.280176263.000000000307D000.00000040.00000001.sdmp, Offset: 0307D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0a58294f111337da1206952acf81f1b11f4f0ec29c803a521914f9b256034fdb
                • Instruction ID: c5f2aa82d2bf4d78a424c1ee3c85f9e8ae327c07a9d42bce34601cfaf8785128
                • Opcode Fuzzy Hash: 0a58294f111337da1206952acf81f1b11f4f0ec29c803a521914f9b256034fdb
                • Instruction Fuzzy Hash: CA210775904240DFDB14DF14D9C0B16BBA5FF84314F28C9ADD9094B346C736D847CAA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000B.00000002.280176263.000000000307D000.00000040.00000001.sdmp, Offset: 0307D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e5bd3cf6c820259fc742b49f5a225b4122fd4e99e9b7daf657f425b0bdf3a055
                • Instruction ID: 88195a4ad93264541d9e2635a2c6a6c57969867369813139fb82eb88bb24a99c
                • Opcode Fuzzy Hash: e5bd3cf6c820259fc742b49f5a225b4122fd4e99e9b7daf657f425b0bdf3a055
                • Instruction Fuzzy Hash: 842162755093808FCB12CF24D994B15BFB1EF46214F28C5DAD8498F657C33AD84ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000B.00000002.280162178.000000000306D000.00000040.00000001.sdmp, Offset: 0306D000, based on PE: false
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction ID: e080605ccb0a876f59af7f2226ed875f4f9b15fe19009672174dda28861bd1f6
                • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                • Instruction Fuzzy Hash: 3111E676504280CFCF12CF14D5D4B56BFB1FB84324F28C6A9D8054B65AC336D45ACBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions