Loading ...

Play interactive tourEdit tour

Analysis Report DHL-#AWB130501923096PDF.exe

Overview

General Information

Sample Name:DHL-#AWB130501923096PDF.exe
Analysis ID:344428
MD5:13e8443bf19ea588b2c7a77251746fe8
SHA1:62ae36fa6f7d5a21e026a8bbebed94bac81384e6
SHA256:1372611a62207431985055ea8ecb4121b3dfb199e615102c06cc38e5aabdd65d
Tags:exeNanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • DHL-#AWB130501923096PDF.exe (PID: 5464 cmdline: 'C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe' MD5: 13E8443BF19EA588B2C7A77251746FE8)
    • cmd.exe (PID: 1968 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 5952 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • vggfghbh.exe (PID: 7044 cmdline: 'C:\Users\user\AppData\Roaming\vggfghbh.exe' MD5: 13E8443BF19EA588B2C7A77251746FE8)
      • InstallUtil.exe (PID: 6204 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 28 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    22.2.InstallUtil.exe.5310000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    22.2.InstallUtil.exe.5310000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    22.2.InstallUtil.exe.53c0000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    22.2.InstallUtil.exe.53c0000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    22.2.InstallUtil.exe.53c0000.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 7 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 6204, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: InstallUtil.exe.6204.22.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeReversingLabs: Detection: 50%
      Multi AV Scanner detection for submitted fileShow sources
      Source: DHL-#AWB130501923096PDF.exeVirustotal: Detection: 50%Perma Link
      Source: DHL-#AWB130501923096PDF.exeReversingLabs: Detection: 50%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: 22.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 22.2.InstallUtil.exe.53c0000.6.unpackAvira: Label: TR/NanoCore.fadte

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000016.00000002.592164449.00000000006D2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0568D709
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov esp, ebp0_2_0568EE40
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_0568FE41
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_0568954A
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_05689550
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_0568667C
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_05687100
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_05687100
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then xor edx, edx0_2_0568702C
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then xor edx, edx0_2_05687038
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_056870F4
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_056870F4
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_05686DE0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_05686DE0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_05686DD4
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_05686DD4
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then jmp 056826C6h0_2_05681EF0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_056868FC
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h18_2_0519D709
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h18_2_0519953C
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h18_2_05199550
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h18_2_0519667C
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then push dword ptr [ebp-24h]18_2_05197100
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh18_2_05197100
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then xor edx, edx18_2_05197038
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then xor edx, edx18_2_0519702C
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then push dword ptr [ebp-24h]18_2_051970F4
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh18_2_051970F4
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then push dword ptr [ebp-20h]18_2_05196DD4
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh18_2_05196DD4
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then push dword ptr [ebp-20h]18_2_05196DE0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh18_2_05196DE0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then jmp 051926C6h18_2_05191EF0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h18_2_051968FC

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 185.162.88.26
      Source: Malware configuration extractorIPs: 185.162.88.26:2091
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: fenixalec.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49740 -> 185.162.88.26:20911
      Source: Joe Sandbox ViewIP Address: 185.162.88.26 185.162.88.26
      Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
      Source: unknownDNS traffic detected: queries for: fenixalec.ddns.net
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324206489.0000000001460000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpString found in binary or memory: http://ns.adb
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
      Source: vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324710955.0000000002FE1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.595604258.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324710955.0000000002FE1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.595604258.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324710955.0000000002FE1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.595604258.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.324710955.0000000002FE1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.595604258.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://www.google.comT
      Source: InstallUtil.exe, 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 22.2.InstallUtil.exe.5310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D86500 CreateProcessAsUserW,18_2_05D86500
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0167C9600_2_0167C960
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_016768100_2_01676810
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0167EB880_2_0167EB88
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_016725500_2_01672550
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_01672D000_2_01672D00
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0167D4590_2_0167D459
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_01679F400_2_01679F40
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_016713600_2_01671360
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0568DDA00_2_0568DDA0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056806E00_2_056806E0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056826E00_2_056826E0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056826F00_2_056826F0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056806D00_2_056806D0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056882580_2_05688258
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0568DD900_2_0568DD90
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_05687CAA0_2_05687CAA
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_05687CB80_2_05687CB8
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_05681EF00_2_05681EF0
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_0568E8BD0_2_0568E8BD
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130C96018_2_0130C960
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130681018_2_01306810
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130EB8818_2_0130EB88
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130D45918_2_0130D459
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_01309F4018_2_01309F40
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_01306F8818_2_01306F88
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130105018_2_01301050
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130136018_2_01301360
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0519F49818_2_0519F498
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0519D94818_2_0519D948
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0519F48818_2_0519F488
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_051906D018_2_051906D0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_051926F018_2_051926F0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_051906E018_2_051906E0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_051926E018_2_051926E0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0519825818_2_05198258
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05197CB818_2_05197CB8
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05197CAA18_2_05197CAA
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05191EF018_2_05191EF0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0519D94118_2_0519D941
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8355818_2_05D83558
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D87C6018_2_05D87C60
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D82E2818_2_05D82E28
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8004018_2_05D80040
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D853C018_2_05D853C0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8136818_2_05D81368
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8354918_2_05D83549
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D87C5018_2_05D87C50
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D846C018_2_05D846C0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D846B818_2_05D846B8
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D85E4818_2_05D85E48
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D82E1818_2_05D82E18
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8888018_2_05D88880
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8000718_2_05D80007
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D853B018_2_05D853B0
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D8135818_2_05D81358
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D86B0818_2_05D86B08
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D84B3818_2_05D84B38
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_05D84B3018_2_05D84B30
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 22_2_006D20B022_2_006D20B0
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 22_2_02A7E48022_2_02A7E480
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 22_2_02A7E47122_2_02A7E471
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 22_2_02A7BBD422_2_02A7BBD4
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 22_2_060F016022_2_060F0160
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vggfghbh.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vggfghbh.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330229025.0000000005060000.00000002.00000001.sdmpBinary or memory string: originalfilename vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330229025.0000000005060000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331063882.0000000006220000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330670447.0000000005730000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331004403.00000000061B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330158992.0000000005000000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs DHL-#AWB130501923096PDF.exe
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
      Source: 00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 22.2.InstallUtil.exe.5310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 22.2.InstallUtil.exe.5310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@9/2
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile created: C:\Users\user\AppData\Roaming\vggfghbh.exeJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6016:120:WilError_01
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4c844ad7-de78-4c04-815b-d468ebb89811}
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: DHL-#AWB130501923096PDF.exeVirustotal: Detection: 50%
      Source: DHL-#AWB130501923096PDF.exeReversingLabs: Detection: 50%
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile read: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe 'C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\vggfghbh.exe 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess created: C:\Users\user\AppData\Roaming\vggfghbh.exe 'C:\Users\user\AppData\Roaming\vggfghbh.exe' Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: DHL-#AWB130501923096PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000016.00000002.592164449.00000000006D2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_00C2213F push esi; retf 0_2_00C2218A
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_01671325 push ds; ret 0_2_01671326
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_01673FD8 push esp; iretd 0_2_01673FC1
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_01673FA7 push esp; iretd 0_2_01673FC1
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_05689477 pushfd ; iretd 0_2_05689479
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeCode function: 0_2_056894A3 pushfd ; iretd 0_2_056894A4
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0085213F push esi; retf 18_2_0085218A
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeCode function: 18_2_0130040A pushfd ; retf 18_2_01300411
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 22.2.InstallUtil.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile created: C:\Users\user\AppData\Roaming\vggfghbh.exeJump to dropped file
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run sweddfJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run sweddfJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile opened: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe\:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeFile opened: C:\Users\user\AppData\Roaming\vggfghbh.exe\:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM_3Show sources
      Source: Yara matchFile source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORY
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeWindow / User API: threadDelayed 2992Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeWindow / User API: threadDelayed 6805Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeWindow / User API: threadDelayed 9069Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeWindow / User API: threadDelayed 726Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 2218Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 7310Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 645Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe TID: 772Thread sleep time: -15679732462653109s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe TID: 772Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe TID: 5316Thread sleep count: 2992 > 30Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe TID: 5316Thread sleep count: 6805 > 30Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe TID: 772Thread sleep count: 40 > 30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exe TID: 7148Thread sleep time: -11068046444225724s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exe TID: 7148Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exe TID: 7152Thread sleep count: 9069 > 30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exe TID: 7152Thread sleep count: 726 > 30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exe TID: 7148Thread sleep count: 53 > 30Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 5188Thread sleep time: -8301034833169293s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmware svga
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331584517.0000000008C00000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330670447.0000000005730000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.227450545.0000000002B30000.00000002.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606400164.0000000005240000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.605818670.00000000064C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331063882.0000000006220000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331063882.0000000006220000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331063882.0000000006220000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmusrvc
      Source: InstallUtil.exe, 00000016.00000003.544552279.0000000000DEA000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmsrvc
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmtools
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330670447.0000000005730000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.227450545.0000000002B30000.00000002.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606400164.0000000005240000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.605818670.00000000064C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330670447.0000000005730000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.227450545.0000000002B30000.00000002.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606400164.0000000005240000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.605818670.00000000064C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.331637731.0000000008C15000.00000004.00000001.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: vggfghbh.exe, 00000012.00000002.606720480.00000000053B0000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
      Source: vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.330670447.0000000005730000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.227450545.0000000002B30000.00000002.00000001.sdmp, vggfghbh.exe, 00000012.00000002.606400164.0000000005240000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.605818670.00000000064C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 402000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 422000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 8E4008Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'Jump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeProcess created: C:\Users\user\AppData\Roaming\vggfghbh.exe 'C:\Users\user\AppData\Roaming\vggfghbh.exe' Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'Jump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: vggfghbh.exe, 00000012.00000002.595388757.00000000016E0000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.601589311.0000000002FBD000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: InstallUtil.exe, 00000016.00000002.596235500.0000000002BE8000.00000004.00000001.sdmpBinary or memory string: Program Managerd
      Source: vggfghbh.exe, 00000012.00000002.595388757.00000000016E0000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.595323411.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: vggfghbh.exe, 00000012.00000002.595388757.00000000016E0000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.595323411.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: InstallUtil.exe, 00000016.00000002.605642326.0000000005D6D000.00000004.00000001.sdmpBinary or memory string: Program Manager4\
      Source: InstallUtil.exe, 00000016.00000002.606002915.00000000067EE000.00000004.00000001.sdmpBinary or memory string: Program Manager4|
      Source: vggfghbh.exe, 00000012.00000002.595388757.00000000016E0000.00000002.00000001.sdmp, InstallUtil.exe, 00000016.00000002.595323411.00000000014F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: InstallUtil.exe, 00000016.00000002.605608009.0000000005BED000.00000004.00000001.sdmpBinary or memory string: Program Manager4
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeQueries volume information: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeQueries volume information: C:\Users\user\AppData\Roaming\vggfghbh.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\vggfghbh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: DHL-#AWB130501923096PDF.exe, 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: vggfghbh.exe, 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000016.00000002.596235500.0000000002BE8000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000016.00000002.596235500.0000000002BE8000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vggfghbh.exe PID: 7044, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6204, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DHL-#AWB130501923096PDF.exe PID: 5464, type: MEMORY
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.53c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 22.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection312Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Software Packing11NTDSSecurity Software Discovery111Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion3SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsModify Registry1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Virtualization/Sandbox Evasion3/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection312Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344428 Sample: DHL-#AWB130501923096PDF.exe Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 37 185.162.88.26:2091 unknown unknown 2->37 39 fenixalec.ddns.net 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 7 other signatures 2->47 8 DHL-#AWB130501923096PDF.exe 15 7 2->8         started        signatures3 process4 file5 27 C:\Users\user\AppData\Roaming\vggfghbh.exe, PE32 8->27 dropped 29 C:\Users\user\AppData\...\InstallUtil.exe, PE32 8->29 dropped 31 C:\Users\...\vggfghbh.exe:Zone.Identifier, ASCII 8->31 dropped 33 C:\Users\...\DHL-#AWB130501923096PDF.exe.log, ASCII 8->33 dropped 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->49 12 vggfghbh.exe 14 2 8->12         started        15 cmd.exe 1 8->15         started        signatures6 process7 signatures8 51 Multi AV Scanner detection for dropped file 12->51 53 Writes to foreign memory regions 12->53 55 Allocates memory in foreign processes 12->55 57 2 other signatures 12->57 17 InstallUtil.exe 6 12->17         started        21 conhost.exe 15->21         started        23 reg.exe 1 1 15->23         started        process9 dnsIp10 35 fenixalec.ddns.net 185.162.88.26, 20911, 49740, 49742 AS40676US Netherlands 17->35 25 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 17->25 dropped file11

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      DHL-#AWB130501923096PDF.exe51%VirustotalBrowse
      DHL-#AWB130501923096PDF.exe50%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
      C:\Users\user\AppData\Roaming\vggfghbh.exe50%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      22.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      22.2.InstallUtil.exe.53c0000.6.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://ns.adb0%Avira URL Cloudsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      fenixalec.ddns.net
      185.162.88.26
      truetrue
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://ns.adbDHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pki.goog/gsr2/GTS1O1.crt0DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.c/gDHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://crl.pki.goog/gsr2/gsr2.crl0?DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ocsp.pki.goog/gsr202DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://pki.goog/repository/0DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.593981212.0000000000F07000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ns.adobe.cobjDHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://ocsp.pki.goog/gts1o1core0DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDHL-#AWB130501923096PDF.exe, 00000000.00000002.324710955.0000000002FE1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.595604258.0000000002C51000.00000004.00000001.sdmpfalse
          high
          http://schema.org/WebPagevggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpfalse
            high
            http://crl.pki.goog/GTS1O1core.crl0DHL-#AWB130501923096PDF.exe, 00000000.00000002.324232114.0000000001472000.00000004.00000020.sdmp, vggfghbh.exe, 00000012.00000002.595684941.0000000002C7F000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://ns.ado/1DHL-#AWB130501923096PDF.exe, 00000000.00000003.323063383.0000000008EE0000.00000004.00000001.sdmp, DHL-#AWB130501923096PDF.exe, 00000000.00000003.219214900.0000000008ED1000.00000004.00000001.sdmp, vggfghbh.exe, 00000012.00000002.607947015.00000000089F0000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            185.162.88.26:2091
            unknownunknown
            unknownunknowntrue
            185.162.88.26
            unknownNetherlands
            40676AS40676UStrue

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:344428
            Start date:26.01.2021
            Start time:15:24:02
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 10m 33s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:DHL-#AWB130501923096PDF.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:32
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@10/5@9/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 0.5% (good quality ratio 0.3%)
            • Quality average: 37.8%
            • Quality standard deviation: 31.8%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 83
            • Number of non-executed functions: 21
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 104.43.139.144, 13.88.21.125, 172.217.23.36, 52.255.188.83, 23.210.248.85, 51.104.139.180, 95.101.22.224, 95.101.22.216, 8.248.139.254, 67.27.157.254, 8.248.141.254, 8.241.9.254, 67.26.83.254, 20.54.26.129, 52.155.217.156
            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, www.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            15:25:02API Interceptor193x Sleep call for process: DHL-#AWB130501923096PDF.exe modified
            15:25:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sweddf C:\Users\user\AppData\Roaming\vggfghbh.exe
            15:25:14AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sweddf C:\Users\user\AppData\Roaming\vggfghbh.exe
            15:25:54API Interceptor176x Sleep call for process: vggfghbh.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            185.162.88.26PO#4018-308875.pdf.exeGet hashmaliciousBrowse
              PO#4018-308875.exeGet hashmaliciousBrowse
                PO#4018-308875.exeGet hashmaliciousBrowse
                  PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                    MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                      silkOrder00110.pdf.exeGet hashmaliciousBrowse
                        Order_BC012356.pdf.exeGet hashmaliciousBrowse
                          Document#20014464370.pdf.exeGet hashmaliciousBrowse

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            fenixalec.ddns.netPO#4018-308875.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            silkOrder00110.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Order_BC012356.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Document#20014464370.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            AS40676USPO#4018-308875.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Ulma9B5jo1.exeGet hashmaliciousBrowse
                            • 104.149.57.92
                            MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Request for Quotation.exeGet hashmaliciousBrowse
                            • 45.34.249.53
                            silkOrder00110.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Order_BC012356.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            Document#20014464370.pdf.exeGet hashmaliciousBrowse
                            • 185.162.88.26
                            t1XJOlYvhExZyrm.exeGet hashmaliciousBrowse
                            • 104.225.208.15
                            SWIFT_COPY00993Payment_advic4555pdf.exeGet hashmaliciousBrowse
                            • 172.106.111.244
                            QN08qH1zYv.exeGet hashmaliciousBrowse
                            • 104.149.57.92
                            SWIFT-COPY Payment advice3243343.exeGet hashmaliciousBrowse
                            • 172.106.111.244
                            catalogo TAWI group.exeGet hashmaliciousBrowse
                            • 107.160.127.252
                            Rfq 214871_TAWI Catalog.exeGet hashmaliciousBrowse
                            • 107.160.127.252
                            Rfq_Catalog.exeGet hashmaliciousBrowse
                            • 107.160.127.252
                            NPD76122.exeGet hashmaliciousBrowse
                            • 104.217.231.247
                            h3dFAROdF3.exeGet hashmaliciousBrowse
                            • 104.217.231.248
                            d2mISAbTQN.exeGet hashmaliciousBrowse
                            • 104.217.231.248

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            C:\Users\user\AppData\Local\Temp\InstallUtil.exeIMG_1677.EXEGet hashmaliciousBrowse
                              PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                file.exeGet hashmaliciousBrowse
                                  IMG_5371.EXEGet hashmaliciousBrowse
                                    file.exeGet hashmaliciousBrowse
                                      IMG_9501.EXEGet hashmaliciousBrowse
                                        IMG_04017.pdf.exeGet hashmaliciousBrowse
                                          GFS_03781.xls.exeGet hashmaliciousBrowse
                                            SPpfYOx5Ju.exeGet hashmaliciousBrowse
                                              PO#4018-308875.exeGet hashmaliciousBrowse
                                                PO#4018-308875.exeGet hashmaliciousBrowse
                                                  IMG_57880.pdf.exeGet hashmaliciousBrowse
                                                    PO 67542 PDF.exeGet hashmaliciousBrowse
                                                      Mi9eI6wu1p.exeGet hashmaliciousBrowse
                                                        OJ4zX7G77Y.exeGet hashmaliciousBrowse
                                                          IMG_50781.pdf.exeGet hashmaliciousBrowse
                                                            IMG_25579.pdf.exeGet hashmaliciousBrowse
                                                              IMG_40317.pdf.exeGet hashmaliciousBrowse
                                                                PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                                                  SecuriteInfo.com.Trojan.PackedNET.509.8504.exeGet hashmaliciousBrowse

                                                                    Created / dropped Files

                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL-#AWB130501923096PDF.exe.log
                                                                    Process:C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):1873
                                                                    Entropy (8bit):5.355036985457214
                                                                    Encrypted:false
                                                                    SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovitHoxHhAHKzvr1qHj:iqXeqm00YqhQnouRqjoKtIxHeqzTwD
                                                                    MD5:CDA95282F22F47DA2FDDC9E912B67FEF
                                                                    SHA1:67A40582A092B5DF40C3EB61A361A2D336FC69E0
                                                                    SHA-256:179E50F31095D0CFA13DCBB9CED6DEE424DFE8CEF8E05BDE1F840273F45E5F49
                                                                    SHA-512:1D151D92AE982D2149C2255826C2FFB89A475A1EB9B9FE93DC3706F3016CD6B309743B36A4D7F6D68F48CE25391FDA7A2BAE42061535EEA7862460424A3A2036
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                    C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                    Process:C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe
                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):41064
                                                                    Entropy (8bit):6.164873449128079
                                                                    Encrypted:false
                                                                    SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                    MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                    SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                    SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                    SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: IMG_1677.EXE, Detection: malicious, Browse
                                                                    • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_5371.EXE, Detection: malicious, Browse
                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_9501.EXE, Detection: malicious, Browse
                                                                    • Filename: IMG_04017.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: GFS_03781.xls.exe, Detection: malicious, Browse
                                                                    • Filename: SPpfYOx5Ju.exe, Detection: malicious, Browse
                                                                    • Filename: PO#4018-308875.exe, Detection: malicious, Browse
                                                                    • Filename: PO#4018-308875.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_57880.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: PO 67542 PDF.exe, Detection: malicious, Browse
                                                                    • Filename: Mi9eI6wu1p.exe, Detection: malicious, Browse
                                                                    • Filename: OJ4zX7G77Y.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_50781.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_25579.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: IMG_40317.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                                    • Filename: SecuriteInfo.com.Trojan.PackedNET.509.8504.exe, Detection: malicious, Browse
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                    Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                    File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8
                                                                    Entropy (8bit):3.0
                                                                    Encrypted:false
                                                                    SSDEEP:3:769tn:mPn
                                                                    MD5:6DEA3729E0EE0DF26AAF5F581C872ABD
                                                                    SHA1:5841F8EA23E50C046B215C7093F79F947C97F512
                                                                    SHA-256:E6A34F967491141207F04D69188778A7B1700B5D64B5E84B6BEBFD09C7B43F10
                                                                    SHA-512:FDCCBE4AECFD43551DA75F7BE3828D2AF245DA3616CB98C10275146EEA0B04899381249FED2F4389238777FB7E5007C32D71729DB0550FC0ED32751B62F92251
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview: ..$.Q..H
                                                                    C:\Users\user\AppData\Roaming\vggfghbh.exe
                                                                    Process:C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):729600
                                                                    Entropy (8bit):5.487518327344531
                                                                    Encrypted:false
                                                                    SSDEEP:12288:ynIAmIvHfNbxp0GZnfNtSyv71xiqZV/HZ25:EIAms/HZnFn1xietHZ2
                                                                    MD5:13E8443BF19EA588B2C7A77251746FE8
                                                                    SHA1:62AE36FA6F7D5A21E026A8BBEBED94BAC81384E6
                                                                    SHA-256:1372611A62207431985055EA8ECB4121B3DFB199E615102C06CC38E5AABDD65D
                                                                    SHA-512:0DBCF414E821C737084E2D3CC378F5E8DE1920AB2D41340D5C474316A051001F71CB47F0733CB588923D885455137C2B36993CAECB160333BC23E539B9DB6DE9
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 50%
                                                                    Reputation:low
                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........................*........... ... ....@.. ....................................`.................................H...S.... ..V&...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...V&... ...(..................@..@.reloc.......`....... ..............@..B........................H.......@....*......O........[..........................................2.".2.`..Y.X.....D...A...........C. .N..O..p.$.{....4."...l.$.l.O..).2...k.../....2.v...m.9.i.O..1.9...l.".X.A....v...k.=./....5.%...a.(.n.O..$.v...m.%.a....f.!...f.%.f.....#.>...................+.#...,z).(.....+L#<.=.8..............C.B...i~ixi.u.,.,.,.".l.l.l.p......).........b.c.n....J.J.J.V.(.(.(.&...........~$.$o$.8.K.K.K.E.T.T.T.H.w.w.w.Z.Z.Z.u.F.K`.a.v.............-.|.}.
                                                                    C:\Users\user\AppData\Roaming\vggfghbh.exe:Zone.Identifier
                                                                    Process:C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Reputation:high, very likely benign file
                                                                    Preview: [ZoneTransfer]....ZoneId=0

                                                                    Static File Info

                                                                    General

                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):5.487518327344531
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    File name:DHL-#AWB130501923096PDF.exe
                                                                    File size:729600
                                                                    MD5:13e8443bf19ea588b2c7a77251746fe8
                                                                    SHA1:62ae36fa6f7d5a21e026a8bbebed94bac81384e6
                                                                    SHA256:1372611a62207431985055ea8ecb4121b3dfb199e615102c06cc38e5aabdd65d
                                                                    SHA512:0dbcf414e821c737084e2d3cc378f5e8de1920ab2d41340d5c474316a051001f71cb47f0733cb588923d885455137c2b36993caecb160333bc23e539b9db6de9
                                                                    SSDEEP:12288:ynIAmIvHfNbxp0GZnfNtSyv71xiqZV/HZ25:EIAms/HZnFn1xietHZ2
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L............................*........... ... ....@.. ....................................`................................

                                                                    File Icon

                                                                    Icon Hash:d8aa9a8e96968eb2

                                                                    Static PE Info

                                                                    General

                                                                    Entrypoint:0x4a159e
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                    Time Stamp:0x1B1180D7 [Wed May 23 03:45:27 1984 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:v4.0.30319
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                    Entrypoint Preview

                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al

                                                                    Data Directories

                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa15480x53.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x12656.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                    Sections

                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x9f5a40x9f600False0.525298713235data5.34593586049IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0xa20000x126560x12800False0.266456397804data5.87092786486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xb60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                    Resources

                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_ICON0xa22500x8a8data
                                                                    RT_ICON0xa2af80x568GLS_BINARY_LSB_FIRST
                                                                    RT_ICON0xa30600x94a8data
                                                                    RT_ICON0xac5080x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 4294967055
                                                                    RT_ICON0xb07300x25a8data
                                                                    RT_ICON0xb2cd80x10a8data
                                                                    RT_ICON0xb3d800x468GLS_BINARY_LSB_FIRST
                                                                    RT_GROUP_ICON0xb41e80x68data
                                                                    RT_VERSION0xb42500x21cdataChineseChina
                                                                    RT_MANIFEST0xb446c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                    Imports

                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain

                                                                    Version Infos

                                                                    DescriptionData
                                                                    LegalCopyrightCopyright(C) 2015-2020 Tencent. All Rights Reserved
                                                                    ProductVersion7.2.19.158
                                                                    FileVersion7.2.19.158
                                                                    FileDescriptionFoxmail
                                                                    Translation0x0804 0x03a8

                                                                    Possible Origin

                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    ChineseChina

                                                                    Network Behavior

                                                                    Network Port Distribution

                                                                    TCP Packets

                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 26, 2021 15:26:32.845701933 CET4974020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:33.184623003 CET2091149740185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:33.690479994 CET4974020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:34.064266920 CET2091149740185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:34.565557003 CET4974020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:34.811480045 CET2091149740185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:38.879782915 CET4974220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:39.050628901 CET2091149742185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:39.550419092 CET4974220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:39.724929094 CET2091149742185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:40.237946033 CET4974220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:40.412484884 CET2091149742185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:44.427333117 CET4974420911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:44.595402002 CET2091149744185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:45.097647905 CET4974420911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:45.267420053 CET2091149744185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:45.769571066 CET4974420911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:45.940321922 CET2091149744185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:50.451677084 CET4974520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:50.637541056 CET2091149745185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:51.145010948 CET4974520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:51.322264910 CET2091149745185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:51.833287001 CET4974520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:52.003298998 CET2091149745185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:56.101031065 CET4974620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:56.274370909 CET2091149746185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:56.786196947 CET4974620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:56.955404997 CET2091149746185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:26:57.458051920 CET4974620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:26:57.628541946 CET2091149746185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:02.887914896 CET4974720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:03.059770107 CET2091149747185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:03.567929983 CET4974720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:03.759299040 CET2091149747185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:04.271156073 CET4974720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:04.452070951 CET2091149747185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:08.460773945 CET4974820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:08.636281013 CET2091149748185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:09.146486998 CET4974820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:09.322979927 CET2091149748185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:09.834032059 CET4974820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:10.005353928 CET2091149748185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:14.024635077 CET4974920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:14.206463099 CET2091149749185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:14.709430933 CET4974920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:14.890496969 CET2091149749185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:15.396995068 CET4974920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:15.577440023 CET2091149749185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:19.586685896 CET4975020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:19.758215904 CET2091149750185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:20.272365093 CET4975020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:20.451981068 CET2091149750185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:20.959933043 CET4975020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:21.132288933 CET2091149750185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:25.776262999 CET4975120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:25.949553967 CET2091149751185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:26.461123943 CET4975120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:26.634459972 CET2091149751185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:27.148838043 CET4975120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:27.317351103 CET2091149751185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:31.417654037 CET4975220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:31.620445013 CET2091149752185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:32.132900000 CET4975220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:32.322252989 CET2091149752185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:32.836074114 CET4975220911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:33.135557890 CET2091149752185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:37.242897987 CET4975320911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:37.415766001 CET2091149753185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:37.923605919 CET4975320911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:38.092448950 CET2091149753185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:38.620318890 CET4975320911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:38.792669058 CET2091149753185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:42.825841904 CET4975820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:43.005439043 CET2091149758185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:43.555794954 CET4975820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:43.728413105 CET2091149758185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:44.359241962 CET4975820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:44.535487890 CET2091149758185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:48.556391001 CET4976520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:48.803752899 CET2091149765185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:49.313306093 CET4976520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:49.484812975 CET2091149765185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:50.015961885 CET4976520911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:50.332370996 CET2091149765185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:54.345803976 CET4976620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:54.522444010 CET2091149766185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:55.032967091 CET4976620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:55.214257002 CET2091149766185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:55.719532967 CET4976620911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:27:55.894716024 CET2091149766185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:27:59.971550941 CET4976720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:00.140594959 CET2091149767185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:00.641827106 CET4976720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:01.010138035 CET2091149767185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:01.517283916 CET4976720911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:01.687365055 CET2091149767185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:05.769408941 CET4976820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:05.939847946 CET2091149768185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:06.454822063 CET4976820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:06.630326033 CET2091149768185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:07.142414093 CET4976820911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:07.315932989 CET2091149768185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:11.380136013 CET4976920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:11.556473017 CET2091149769185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:12.064704895 CET4976920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:12.244308949 CET2091149769185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:12.752213001 CET4976920911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:12.927459002 CET2091149769185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:16.942323923 CET4977020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:17.113467932 CET2091149770185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:17.627621889 CET4977020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:17.804585934 CET2091149770185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:18.315141916 CET4977020911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:18.489428997 CET2091149770185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:22.504024029 CET4977120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:22.676829100 CET2091149771185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:23.190589905 CET4977120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:23.359457970 CET2091149771185.162.88.26192.168.2.3
                                                                    Jan 26, 2021 15:28:23.862478971 CET4977120911192.168.2.3185.162.88.26
                                                                    Jan 26, 2021 15:28:24.034260035 CET2091149771185.162.88.26192.168.2.3

                                                                    UDP Packets

                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 26, 2021 15:24:51.004863977 CET6418553192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:51.052695990 CET53641858.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:51.936860085 CET6511053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:51.984791040 CET53651108.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:53.826543093 CET5836153192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:53.874450922 CET53583618.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:55.349008083 CET6349253192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:55.399744987 CET53634928.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:57.140198946 CET6083153192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:57.201503992 CET53608318.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:57.424484968 CET6010053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:57.483562946 CET53601008.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:58.490983009 CET5319553192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:58.539068937 CET53531958.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:24:59.427931070 CET5014153192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:24:59.479903936 CET53501418.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:00.378860950 CET5302353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:00.426603079 CET53530238.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:01.322943926 CET4956353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:01.370829105 CET53495638.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:02.205514908 CET5135253192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:02.262638092 CET53513528.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:05.022424936 CET5934953192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:05.070317030 CET53593498.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:05.799045086 CET5708453192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:05.846967936 CET53570848.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:06.617281914 CET5882353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:06.668586016 CET53588238.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:19.756206989 CET5756853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:19.814055920 CET53575688.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:23.925025940 CET5054053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:23.975766897 CET53505408.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:35.989748955 CET5436653192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:36.048000097 CET53543668.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:38.849658966 CET5303453192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:38.900736094 CET53530348.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:48.913367987 CET5776253192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:48.969801903 CET53577628.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:25:54.724850893 CET5543553192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:25:54.796421051 CET53554358.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:01.806772947 CET5071353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:01.857460022 CET53507138.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:06.749186039 CET5613253192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:06.816737890 CET53561328.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:37.744086981 CET5898753192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:37.792056084 CET53589878.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:40.731296062 CET5657953192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:40.787782907 CET53565798.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:50.390696049 CET6063353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:50.448775053 CET53606338.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:26:56.040361881 CET6129253192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:26:56.098870039 CET53612928.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:02.821433067 CET6361953192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:02.877702951 CET53636198.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:25.705291033 CET6493853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:25.761727095 CET53649388.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:31.328788042 CET6194653192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:31.387881994 CET53619468.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:37.158355951 CET6491053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:37.214723110 CET53649108.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:40.337074041 CET5212353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:40.387881041 CET53521238.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:41.053005934 CET5613053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:41.112512112 CET53561308.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:41.787533998 CET5633853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:41.835544109 CET53563388.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:42.510091066 CET5942053192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:42.557867050 CET53594208.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:43.160180092 CET5878453192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:43.208003044 CET53587848.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:43.871534109 CET6397853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:43.919646025 CET53639788.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:44.750557899 CET6293853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:44.809628963 CET53629388.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:45.884926081 CET5570853192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:45.942502022 CET53557088.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:47.086849928 CET5680353192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:47.143177986 CET53568038.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:47.673472881 CET5714553192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:47.721323013 CET53571458.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:27:59.909024000 CET5535953192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:27:59.969980001 CET53553598.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:28:05.705981970 CET5830653192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:28:05.768352985 CET53583068.8.8.8192.168.2.3
                                                                    Jan 26, 2021 15:28:11.331341028 CET6412453192.168.2.38.8.8.8
                                                                    Jan 26, 2021 15:28:11.379264116 CET53641248.8.8.8192.168.2.3

                                                                    DNS Queries

                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                    Jan 26, 2021 15:26:50.390696049 CET192.168.2.38.8.8.80x98a6Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:26:56.040361881 CET192.168.2.38.8.8.80x73feStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:02.821433067 CET192.168.2.38.8.8.80x3caeStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:25.705291033 CET192.168.2.38.8.8.80xe979Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:31.328788042 CET192.168.2.38.8.8.80xa840Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:37.158355951 CET192.168.2.38.8.8.80x427dStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:59.909024000 CET192.168.2.38.8.8.80xfb0eStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:28:05.705981970 CET192.168.2.38.8.8.80xf275Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:28:11.331341028 CET192.168.2.38.8.8.80x936fStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)

                                                                    DNS Answers

                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                    Jan 26, 2021 15:26:50.448775053 CET8.8.8.8192.168.2.30x98a6No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:26:56.098870039 CET8.8.8.8192.168.2.30x73feNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:02.877702951 CET8.8.8.8192.168.2.30x3caeNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:25.761727095 CET8.8.8.8192.168.2.30xe979No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:31.387881994 CET8.8.8.8192.168.2.30xa840No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:37.214723110 CET8.8.8.8192.168.2.30x427dNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:27:59.969980001 CET8.8.8.8192.168.2.30xfb0eNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:28:05.768352985 CET8.8.8.8192.168.2.30xf275No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                    Jan 26, 2021 15:28:11.379264116 CET8.8.8.8192.168.2.30x936fNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)

                                                                    Code Manipulations

                                                                    Statistics

                                                                    CPU Usage

                                                                    Click to jump to process

                                                                    Memory Usage

                                                                    Click to jump to process

                                                                    High Level Behavior Distribution

                                                                    Click to dive into process behavior distribution

                                                                    Behavior

                                                                    Click to jump to process

                                                                    System Behavior

                                                                    General

                                                                    Start time:15:24:55
                                                                    Start date:26/01/2021
                                                                    Path:C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'C:\Users\user\Desktop\DHL-#AWB130501923096PDF.exe'
                                                                    Imagebase:0xc20000
                                                                    File size:729600 bytes
                                                                    MD5 hash:13E8443BF19EA588B2C7A77251746FE8
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.326369360.0000000004937000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.328448374.0000000004ACD000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:25:00
                                                                    Start date:26/01/2021
                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
                                                                    Imagebase:0xbd0000
                                                                    File size:232960 bytes
                                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:25:01
                                                                    Start date:26/01/2021
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6b2800000
                                                                    File size:625664 bytes
                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:25:01
                                                                    Start date:26/01/2021
                                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'sweddf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\vggfghbh.exe'
                                                                    Imagebase:0x8c0000
                                                                    File size:59392 bytes
                                                                    MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    General

                                                                    Start time:15:25:46
                                                                    Start date:26/01/2021
                                                                    Path:C:\Users\user\AppData\Roaming\vggfghbh.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:'C:\Users\user\AppData\Roaming\vggfghbh.exe'
                                                                    Imagebase:0x850000
                                                                    File size:729600 bytes
                                                                    MD5 hash:13E8443BF19EA588B2C7A77251746FE8
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.605435037.000000000473C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.605142766.00000000045A6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Antivirus matches:
                                                                    • Detection: 50%, ReversingLabs
                                                                    Reputation:low

                                                                    General

                                                                    Start time:15:26:24
                                                                    Start date:26/01/2021
                                                                    Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                    Imagebase:0x6d0000
                                                                    File size:41064 bytes
                                                                    MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000016.00000002.605338854.0000000005310000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.605485890.00000000053C0000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.591464383.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, Author: Joe Security
                                                                    • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.601866891.0000000003BD9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                    Antivirus matches:
                                                                    • Detection: 0%, Metadefender, Browse
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate

                                                                    Disassembly

                                                                    Code Analysis

                                                                    Reset < >

                                                                      Executed Functions

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$@
                                                                      • API String ID: 0-1426351568
                                                                      • Opcode ID: 679e920626b47881fe66e37fff26a921f07c361012795166da6a7d2c36f03064
                                                                      • Instruction ID: 40fc09e8d1c42cf398f9dd0f9341d39a8aef676900533d99e3e066ac30fa25cc
                                                                      • Opcode Fuzzy Hash: 679e920626b47881fe66e37fff26a921f07c361012795166da6a7d2c36f03064
                                                                      • Instruction Fuzzy Hash: 50629CB4A0121ACFDB64CFA9C984A9DFBF2BF48315F19C5A9D508AB211D730A981CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: G
                                                                      • API String ID: 0-985283518
                                                                      • Opcode ID: 22138de505b979da49197c6bd8c4c6a3b8aacb40ce8e81aef33551986032500e
                                                                      • Instruction ID: df49877b4759c75ca9188f36569d7dbb20de01d3d773325466d7936cd57dfcdd
                                                                      • Opcode Fuzzy Hash: 22138de505b979da49197c6bd8c4c6a3b8aacb40ce8e81aef33551986032500e
                                                                      • Instruction Fuzzy Hash: 49C10331B08245CFC7148BACCC616AAB7B6FB85314F15853ED5059B785DB39DC82CBA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d57efe88290aa9fe390f1452fe7e21f22df969dc9830b8c47b6e81a19f8a8224
                                                                      • Instruction ID: ca780eb7177e702d01a632fe709e9fd9a7ffd011becbb73ecbf0080ed1fde0e0
                                                                      • Opcode Fuzzy Hash: d57efe88290aa9fe390f1452fe7e21f22df969dc9830b8c47b6e81a19f8a8224
                                                                      • Instruction Fuzzy Hash: 8A829E70A002098FDB15DFA8C894AAEBBF2FF89314F158469E915EB361DB30DC52CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7f57d527334aa40d41014662d322a760c8a7248349d34dabae17d670a0934362
                                                                      • Instruction ID: 5c614127132f4d44ebb86b03bb447b568347e5a12e96a3cbff5c02e7248d4223
                                                                      • Opcode Fuzzy Hash: 7f57d527334aa40d41014662d322a760c8a7248349d34dabae17d670a0934362
                                                                      • Instruction Fuzzy Hash: 6A829134A00209DFCB15CFA8C984AAEBBF2FF88314F1A8559E549DB366D730E951CB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: df60c871281f166d05c40ca4bd1bb30dcb25d84e215611ab57a10e1a5c2b0690
                                                                      • Instruction ID: c861325f68b9f44c2062f4b628a04d2a00c9a42100cada7e7d2572ea97b12fb6
                                                                      • Opcode Fuzzy Hash: df60c871281f166d05c40ca4bd1bb30dcb25d84e215611ab57a10e1a5c2b0690
                                                                      • Instruction Fuzzy Hash: 0F429174E01229CFDB54CFA9C984B9DBBB2BF88310F2485A9D819A7355D731AE81CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 66843feb9f23c057a9ecb3c0077d636baad1a4f43bf4fd2ebcb9d9e7612a7399
                                                                      • Instruction ID: eb8c3863e55b1d028211a34bc2616b7cec8b6b9597adbb0bcfa635045d358848
                                                                      • Opcode Fuzzy Hash: 66843feb9f23c057a9ecb3c0077d636baad1a4f43bf4fd2ebcb9d9e7612a7399
                                                                      • Instruction Fuzzy Hash: 5532C2B4900219CFDB54DFA9C984A8DFBB2BF48715F59C999C508AB211CB30DD85CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9ab76cc0e7923718087ef30eba044b74cd7e3ef768398b6e63815378cdc86419
                                                                      • Instruction ID: a650e165a4fcc5d6bef0086dd498f65453e829458e5f15cd3a9d236a96d72ea8
                                                                      • Opcode Fuzzy Hash: 9ab76cc0e7923718087ef30eba044b74cd7e3ef768398b6e63815378cdc86419
                                                                      • Instruction Fuzzy Hash: 24D1DA35704602CBEB346B7ACC6537A77A6AF80B40F54852ED987CB784DB35C982C752
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0550f1a1277bf0644cea17ed18b5e4f0b5e8ac92c48c81aee3783a8d82764b0
                                                                      • Instruction ID: 3e16ce8e08e6f98460b0b305e0fe9f10429bc40ea8e933e8be0c792a1e20db45
                                                                      • Opcode Fuzzy Hash: f0550f1a1277bf0644cea17ed18b5e4f0b5e8ac92c48c81aee3783a8d82764b0
                                                                      • Instruction Fuzzy Hash: 11D1CF74E00218CFDB14DFA5D958BEDFBB2BB49301F2095AAD809A7354DB345A85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e1511d8ca95a45fc4342aa94bdc724753b2036e60a3516644cf5ef7562ef5a46
                                                                      • Instruction ID: 008a661f98023da3eb72750ac4f49a6aeb2ed8aa74ac17e1c2cd2af634e60367
                                                                      • Opcode Fuzzy Hash: e1511d8ca95a45fc4342aa94bdc724753b2036e60a3516644cf5ef7562ef5a46
                                                                      • Instruction Fuzzy Hash: E8D1BF74E00218CFDB24DFA5D998BEDFBB2BB49341F2085AAD809A7354DB345A85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3c46d17939fe33860e7f70a8615a20b0f806cbdc25f15f5811fd2c51e6f05fe3
                                                                      • Instruction ID: fd4f64dee4b73c77e88dc309adb452d8530e814770fd9afb485b26b149b3a07a
                                                                      • Opcode Fuzzy Hash: 3c46d17939fe33860e7f70a8615a20b0f806cbdc25f15f5811fd2c51e6f05fe3
                                                                      • Instruction Fuzzy Hash: 84510FB4D05218CFDB18DFA5D5887ECBBB2BF49305F248129E401AB3A4C7759986CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a9d851e729d17970e6e659bb962e1629a25f7fe731e7be855a6ca930473158aa
                                                                      • Instruction ID: 1324ebe7bca573f5227b1aae2e1f028bd5594e925b8357c8bcf2c2b6ff2a3dfa
                                                                      • Opcode Fuzzy Hash: a9d851e729d17970e6e659bb962e1629a25f7fe731e7be855a6ca930473158aa
                                                                      • Instruction Fuzzy Hash: 2B2123B1D042188FDB04AFB4D8187EEFBB1BB4A315F10582AD016B3690CB791945CFA8
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3aa6f2e69f236f6776058c6d95bf83aeb64d7f61a75da5a1ffa21061666f6fe3
                                                                      • Instruction ID: f420a6eb4e21a93d8e8688ddaa7fc61e092e366be1e3702e86aac3655deaa141
                                                                      • Opcode Fuzzy Hash: 3aa6f2e69f236f6776058c6d95bf83aeb64d7f61a75da5a1ffa21061666f6fe3
                                                                      • Instruction Fuzzy Hash: 480156B0C452089FCB04EFA4D9543EEBFB0BB0A205F2085AAC041A7681D7300A06CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CopyFileExW.KERNEL32(?,?,?,?,?,?), ref: 0568F1E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CopyFile
                                                                      • String ID:
                                                                      • API String ID: 1304948518-0
                                                                      • Opcode ID: 0a1474f119444484a0e2638bb9a8223a60ec22586cdf7ae507f0e66119e04f62
                                                                      • Instruction ID: 700b6f7942883156b44c579ba6fb6d0b177fd171bcee55d69fe674a63fe4ff7b
                                                                      • Opcode Fuzzy Hash: 0a1474f119444484a0e2638bb9a8223a60ec22586cdf7ae507f0e66119e04f62
                                                                      • Instruction Fuzzy Hash: ADC1E074E042189FDB24DFA8C981BADFBB2BF49304F1481A9E809B7351DB34A985CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CopyFileExW.KERNEL32(?,?,?,?,?,?), ref: 0568F1E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CopyFile
                                                                      • String ID:
                                                                      • API String ID: 1304948518-0
                                                                      • Opcode ID: 190927a1dda02b5c80030c2b9f48ab657e1325ed750011f906fb1575cf916b08
                                                                      • Instruction ID: eb4d2a7ed5aea9d83c52e754a6f4145fe21a8e91976a0aff92a4c56d8e675156
                                                                      • Opcode Fuzzy Hash: 190927a1dda02b5c80030c2b9f48ab657e1325ed750011f906fb1575cf916b08
                                                                      • Instruction Fuzzy Hash: 40B1F074E042189FDB20DFA8C881BEEFBB2BF49304F1481A9E849A7351D734A985CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CopyFileExW.KERNEL32(?,?,?,?,?,?), ref: 0568F1E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CopyFile
                                                                      • String ID:
                                                                      • API String ID: 1304948518-0
                                                                      • Opcode ID: 522082e1862ea6723a29e04bcf539c4ebfde6d21076389dfd513a1f6c4f9be27
                                                                      • Instruction ID: 711de33308d40bff1465b84aecd5493d907ea3e9bf54ea4913c395ca8b582360
                                                                      • Opcode Fuzzy Hash: 522082e1862ea6723a29e04bcf539c4ebfde6d21076389dfd513a1f6c4f9be27
                                                                      • Instruction Fuzzy Hash: 1FB1E174E042189FDB24DFA8C981BADFBB2BF49304F1482A9E809B7351D734A985CF45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 0167D3FF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: def0e805d35350c1e59085d086077da8e3d42e0216c1def8d2256cde964e1cea
                                                                      • Instruction ID: 38aaf274ca90b9142d29f8ffb3a5adad76a719c6a75838c86a1e8a389b3235e3
                                                                      • Opcode Fuzzy Hash: def0e805d35350c1e59085d086077da8e3d42e0216c1def8d2256cde964e1cea
                                                                      • Instruction Fuzzy Hash: 0B31A8B9D012589FCB10CFA9D984AEEFBB1AF19310F14942AE814B7210D735AA46CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 0167D3FF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: b01aa25fa641b6a1e33949310d937302c5d9437bb0eb18dd5231b2b9e00d6d79
                                                                      • Instruction ID: e8175f4218955a250ca2a58b9418c4c535f57fb785d9f1e84b28c4fc12e837ec
                                                                      • Opcode Fuzzy Hash: b01aa25fa641b6a1e33949310d937302c5d9437bb0eb18dd5231b2b9e00d6d79
                                                                      • Instruction Fuzzy Hash: EC3195B9D04258AFCB10CFA9D984ADEFBB4AF19310F14942AE814B7210D735A945CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.329887263.0000000004FE0000.00000040.00000001.sdmp, Offset: 04FE0000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 679cdee230f0f5ca07111be99e9763dd2a60599b3db04810480f50b6e3b7c084
                                                                      • Instruction ID: 0eb68c78b7ae418158307e0c2afdfc28dd7f29ce9f799e585b0938c7f8c1c6a9
                                                                      • Opcode Fuzzy Hash: 679cdee230f0f5ca07111be99e9763dd2a60599b3db04810480f50b6e3b7c084
                                                                      • Instruction Fuzzy Hash: 7031E2B1D05219CFCB04DFA9C5517EEBBF2AF49305F2084AAC405B7290EB795A46CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.329887263.0000000004FE0000.00000040.00000001.sdmp, Offset: 04FE0000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 95fef4a3510e770efa15d45e329bc839ccaf8b8c1c27c4fa1bf951862bcc0815
                                                                      • Instruction ID: 5c5e1bdc4be506baf5aa622f2df78b5b7c1a4447fc8b7d6b679f44c0cada4568
                                                                      • Opcode Fuzzy Hash: 95fef4a3510e770efa15d45e329bc839ccaf8b8c1c27c4fa1bf951862bcc0815
                                                                      • Instruction Fuzzy Hash: B4118F70D0D3889FCB02DBB498A51DDBFB1AF17204F1584EBD885D7253E6395A06CB11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.329887263.0000000004FE0000.00000040.00000001.sdmp, Offset: 04FE0000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 69abd86e5de5858f9fe55e991d811e1ddc7b7665da1d57a6d5ddb45f15f37bf7
                                                                      • Instruction ID: 3f40a89a4dba0de071084d896b9531434a8300f128c7db641b4ec851cfcf1661
                                                                      • Opcode Fuzzy Hash: 69abd86e5de5858f9fe55e991d811e1ddc7b7665da1d57a6d5ddb45f15f37bf7
                                                                      • Instruction Fuzzy Hash: 8DF01774D0420CAFCB44EFA9D5416ADFBF5FB48304F1089AA8818A3340EB746A01CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Non-executed Functions

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$ntin$ntin
                                                                      • API String ID: 0-1029651476
                                                                      • Opcode ID: c4bc04e348ed6913cf81dafff465192a5a20eb8369241b8f89a65295f3010f87
                                                                      • Instruction ID: 3da5e3f977f8d08e307e8b6621e0a63b6888bc575dfa23a4e22311fa1938b70c
                                                                      • Opcode Fuzzy Hash: c4bc04e348ed6913cf81dafff465192a5a20eb8369241b8f89a65295f3010f87
                                                                      • Instruction Fuzzy Hash: 99A2D374E042198FDB14DF99C985BEDFBB2BF89314F2481A9D508AB355D730A982CF60
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$ntin$ntin
                                                                      • API String ID: 0-1029651476
                                                                      • Opcode ID: 240ce10fad5c439876b3838c9ccb6d9a3a2e5b49247fb0564dfb5e2a7f96fc94
                                                                      • Instruction ID: 8d6b282a7eaf4214951c0127d37261cc0dbbeda1f42d514655dca3e7017e85a6
                                                                      • Opcode Fuzzy Hash: 240ce10fad5c439876b3838c9ccb6d9a3a2e5b49247fb0564dfb5e2a7f96fc94
                                                                      • Instruction Fuzzy Hash: CAE192B5E046198FDB18CFAAC985ADEBBF2BF88310F14C1A9D508AB364DB345941CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90f7d60c303fe68c1507212e8badf1c1b058dc85ac974a6a687ec44a0e28bbae
                                                                      • Instruction ID: fb47612e35ef93e2b129e88056120f3b31e4b2d7be117b1db87c0fbd4d13dec7
                                                                      • Opcode Fuzzy Hash: 90f7d60c303fe68c1507212e8badf1c1b058dc85ac974a6a687ec44a0e28bbae
                                                                      • Instruction Fuzzy Hash: 98220474D01268CFDB28DF65D9647ECBBB2BF49341F2085A9D40AAB394DB359A81CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.324431968.0000000001670000.00000040.00000001.sdmp, Offset: 01670000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 092826392b42fc0cfcd348d2bd65a3f4c802c406b7c82abd3fb7bd4d3dd74207
                                                                      • Instruction ID: 49b8052c872132ac02c60bcc4f0f74c223b0a55bcbb18e51abf0b565a86ae820
                                                                      • Opcode Fuzzy Hash: 092826392b42fc0cfcd348d2bd65a3f4c802c406b7c82abd3fb7bd4d3dd74207
                                                                      • Instruction Fuzzy Hash: 14028B34A08259CFCB15CBA8C8516ADB7B2FF46310F19816BE415EB791D734EC82CBA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9669f13d03394a461265573ffd2ffb8205974465b9595ba456e8409dacd0965b
                                                                      • Instruction ID: 0230327a386ed2aec4536771a3c6ff3ccecbef34d7632158d3366bf7d1cbcf6d
                                                                      • Opcode Fuzzy Hash: 9669f13d03394a461265573ffd2ffb8205974465b9595ba456e8409dacd0965b
                                                                      • Instruction Fuzzy Hash: 0F02BF74D05228CFDB24DFA9C984BEDBBB6BB48304F1481AAD409A7391DB359E85CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 94b93c4e1780353cf9ec7c5c048e738385ba23ce8d6923193743d7277c066252
                                                                      • Instruction ID: 9b766785aacbf585d1684e4fe89493e5934cd5cef133486cedec27fb822b04ed
                                                                      • Opcode Fuzzy Hash: 94b93c4e1780353cf9ec7c5c048e738385ba23ce8d6923193743d7277c066252
                                                                      • Instruction Fuzzy Hash: D4D1C174E00218CFDB54EFA9D994BADBBB2BF88304F1085AAD509A7354EB305E85CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2d77c38c4ce8b08d0b57397c5873ec83d20849e98adf86b82f758eb2b9b47773
                                                                      • Instruction ID: 8bb07a5a8c53f3aecc471bbc4cb4dbc304e8ead3ee24a4551792de47e8d4da5d
                                                                      • Opcode Fuzzy Hash: 2d77c38c4ce8b08d0b57397c5873ec83d20849e98adf86b82f758eb2b9b47773
                                                                      • Instruction Fuzzy Hash: 8DD1D631C2075A8ECB10EFA4C854AD9B371FF95200F618B9AD14A7B225FB706AC9CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4c1f097180a13b82e8ee38a9f0c7b129744a5c002a4bd67f78cb597580c2c859
                                                                      • Instruction ID: 703dad5c637a7d89630cb20febabc4ae5fb9c5851cffa8b284beb6554f8b19e8
                                                                      • Opcode Fuzzy Hash: 4c1f097180a13b82e8ee38a9f0c7b129744a5c002a4bd67f78cb597580c2c859
                                                                      • Instruction Fuzzy Hash: 05D1D731C2075A8ECB10EFA4C954AD9B371FF95200F518B9AD14A7B225FB706AC9CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b5eba6554a7b6890886a5b39cdc603cdc762d5c2ece332c6c09a1d555f35152
                                                                      • Instruction ID: 836cf4c6c12510560aac8dbd80608293a48e886a81987fda33ec86d5f507ad89
                                                                      • Opcode Fuzzy Hash: 0b5eba6554a7b6890886a5b39cdc603cdc762d5c2ece332c6c09a1d555f35152
                                                                      • Instruction Fuzzy Hash: 10B1D775E002188FDB14DFA9C944ADDFBB2BF89304F64C6AAD409AB315DB319985CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7face90c2a1da1f8448936fcce38870f24325f98fad4514a43caf6214d6821da
                                                                      • Instruction ID: 181f1aeab32a8cfaad500d9e59077d3a661be06ec70ee85188f8e21832ed9e2a
                                                                      • Opcode Fuzzy Hash: 7face90c2a1da1f8448936fcce38870f24325f98fad4514a43caf6214d6821da
                                                                      • Instruction Fuzzy Hash: 60A10074E00218CFDB14EFA9C984B9DFBB2FF88304F1085AAD449AB255EB305A95CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3753535f42c9543d93203f2dc77cda1ce8e22b56ff6934f9c29eec6f7aec6c90
                                                                      • Instruction ID: 211561d401fb60997e1964128af3ea9cc2b5ac56f2d994eb93add1e2eb0b89d3
                                                                      • Opcode Fuzzy Hash: 3753535f42c9543d93203f2dc77cda1ce8e22b56ff6934f9c29eec6f7aec6c90
                                                                      • Instruction Fuzzy Hash: C141ACB4D002489FDB10DFE9D584AEEBBF1BB09304F20952AE419BB360DB349985CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 451e8e44bbbcbf55e528d85dc7771e0ad99b1d91136422898e6aed59b0f7b273
                                                                      • Instruction ID: 21916e7d7d9ff6e81f54c4865c9b4e8b049ae407dc3e260d4283a49ded4782a2
                                                                      • Opcode Fuzzy Hash: 451e8e44bbbcbf55e528d85dc7771e0ad99b1d91136422898e6aed59b0f7b273
                                                                      • Instruction Fuzzy Hash: 75419BB4D002489FDB10DFA9C584AEEBBF4BB09304F20952AE819BB351DB35A985CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0bdb8de28ebfe09b35d71dc614fda4ff6e317f4055de53002c0fa5e0ac9890eb
                                                                      • Instruction ID: 0b16c471b79e0358dec61ae090611a6fc15d07b5469064e35c8a9a5d009b8ca9
                                                                      • Opcode Fuzzy Hash: 0bdb8de28ebfe09b35d71dc614fda4ff6e317f4055de53002c0fa5e0ac9890eb
                                                                      • Instruction Fuzzy Hash: 2A41C8B4D012489FDB10DFA9D584BEEBBF0BB09314F20912AE405BB360CB75A949CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7f5a80a6840586aa73f5cb25cd37f70484691b32f9f4176690a881d2968aceae
                                                                      • Instruction ID: c17508d8c89ae95b30601b364af2d4474b4c1a309979551f45e4b480779cb0fa
                                                                      • Opcode Fuzzy Hash: 7f5a80a6840586aa73f5cb25cd37f70484691b32f9f4176690a881d2968aceae
                                                                      • Instruction Fuzzy Hash: E841B8B4D002089FDB10DFA9C584BEEBBF0BB09304F20952AE415BB350DB74A949CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1e5b596f860aff90dc9f428296b6510f8eedf27288dfb3fe80d10b586d0b7f88
                                                                      • Instruction ID: 6dd47d95010d79b26f1b66a91f0fb37c2a326d12ec7291f553c1eed7521a0259
                                                                      • Opcode Fuzzy Hash: 1e5b596f860aff90dc9f428296b6510f8eedf27288dfb3fe80d10b586d0b7f88
                                                                      • Instruction Fuzzy Hash: 3A318BB4D05208EFCB14DFA9D584AEEBBF2BB49310F24922AE814B7350C3349941CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 827dac8a6551cbac11f59063c63402f32cb81efa854160cd20942b89c5801e8f
                                                                      • Instruction ID: 7c4203ca72a19890d5c48b78e32c08357cc55fd9dc5fcea20ffe3d2162f44b75
                                                                      • Opcode Fuzzy Hash: 827dac8a6551cbac11f59063c63402f32cb81efa854160cd20942b89c5801e8f
                                                                      • Instruction Fuzzy Hash: 16315BB4D05208EFCB14DFA9D584AEEBBF2BB99310F24922AE814B7350D7349941CF58
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1aa9965d78764d193c5aa95eabc1097340a634dbbefa41f9d0899361117f8ff7
                                                                      • Instruction ID: 0cf53f92be3944ab0f577fe69027518770bc199752040666166c8124bc44a16c
                                                                      • Opcode Fuzzy Hash: 1aa9965d78764d193c5aa95eabc1097340a634dbbefa41f9d0899361117f8ff7
                                                                      • Instruction Fuzzy Hash: E921DDB4D042089FCB04DFAAC4846EDBBF1EB4A310F24E229E825B7750D7709545CF58
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3190c325e2accf888f1a11c52847c5da4bde5d233bb3e4ba66872bd8c6979507
                                                                      • Instruction ID: 7c4af02821beaeb5b8230d0ba91234fb2dd2aa6bc54fed3173aafd33b473ffd5
                                                                      • Opcode Fuzzy Hash: 3190c325e2accf888f1a11c52847c5da4bde5d233bb3e4ba66872bd8c6979507
                                                                      • Instruction Fuzzy Hash: 0621AD74D042089FCB04DFAAC4846EDBBF1EB49310F24E229E825B7750D7349945CF58
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fd5359d91c8da9828097ed1d7179480684cc2f25b40cf221d542851d5ead6c75
                                                                      • Instruction ID: aa10bd6f2c71543dae34297d1a3a09ae040cb1360b85d71933b636ac79d0f66b
                                                                      • Opcode Fuzzy Hash: fd5359d91c8da9828097ed1d7179480684cc2f25b40cf221d542851d5ead6c75
                                                                      • Instruction Fuzzy Hash: 2901B2B4D052089F8F04CFA9D4418EEFFF2AB5A310F24A26AD805B7310D7318911CF98
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.330654887.0000000005680000.00000040.00000001.sdmp, Offset: 05680000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                                      • Instruction ID: 2d8bdf274e04d2e0c7058617dcbbadcecbc582f4ab69896baa6e1ef6e39ad8f9
                                                                      • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                                      • Instruction Fuzzy Hash: B1F042B5D0520D9F8F04DFA9D5419EEFBF2AB59310F10A16AE814B3310E7359951CFA8
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Executed Functions

                                                                      APIs
                                                                      • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 05D866EC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateProcessUser
                                                                      • String ID: u$l
                                                                      • API String ID: 2217836671-2838452502
                                                                      • Opcode ID: 6b84453cabdaf20c90dc4cd81d18c0367108c453a7b07440c7efb589e418775b
                                                                      • Instruction ID: 30a1e3ef4a9192449dcfb097c2df195e33324e1d66d00397c7d77f075c218703
                                                                      • Opcode Fuzzy Hash: 6b84453cabdaf20c90dc4cd81d18c0367108c453a7b07440c7efb589e418775b
                                                                      • Instruction Fuzzy Hash: 6E91C071D0026D9FCF21CFA8C880BEDBBB5BB19314F0490AAE549B7210DB349A85CF94
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$@
                                                                      • API String ID: 0-1426351568
                                                                      • Opcode ID: 592b888a724645443727696a56d3c805db14f65458d6461c102ff126f126f0a9
                                                                      • Instruction ID: 5f0931e33ab807d7fa35cb841ca04513bb7db73d5da01e3c27123fed4c808fc8
                                                                      • Opcode Fuzzy Hash: 592b888a724645443727696a56d3c805db14f65458d6461c102ff126f126f0a9
                                                                      • Instruction Fuzzy Hash: C5629FB4E00219DFDB68CFA9C984A9DFBF2BF48315F19C5A9D508AB211D730A981CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$@
                                                                      • API String ID: 0-1426351568
                                                                      • Opcode ID: a2fee00664e24be8bb7f8eb2e77e5008ad72d7adf497fceffc2a2693e15eedec
                                                                      • Instruction ID: 7a2444e10670e1d1facc66056d5af70e79fcee1f9976c8debf7bb5bac235a999
                                                                      • Opcode Fuzzy Hash: a2fee00664e24be8bb7f8eb2e77e5008ad72d7adf497fceffc2a2693e15eedec
                                                                      • Instruction Fuzzy Hash: 1D22D0B4A00219DFDB68CFAAC984A8DFBF2BF48715F19C5E9D508AB211D7309981CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 15bd6734c6909b14aaf008a1dbdfe72f5ae853abe27c4710d3d6a9af2ee93ef7
                                                                      • Instruction ID: 80d9c1f054db6a8c66889980de8bb216ffcc57bd47744ec115a4ec0fa150d886
                                                                      • Opcode Fuzzy Hash: 15bd6734c6909b14aaf008a1dbdfe72f5ae853abe27c4710d3d6a9af2ee93ef7
                                                                      • Instruction Fuzzy Hash: E8D1AFB4D01218CFDB58CFA5D948BDDBBF2BB89301F2081AAD40AA7354DB745A86CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 593f5f49cfce42bbc2e76eeaa69ed368beceb9e6147350fcd853c31f156af471
                                                                      • Instruction ID: 3dc4305926892d66de86418f25e19408e6bc03b3768247a1b23fca01d7ce49c4
                                                                      • Opcode Fuzzy Hash: 593f5f49cfce42bbc2e76eeaa69ed368beceb9e6147350fcd853c31f156af471
                                                                      • Instruction Fuzzy Hash: 65D1AEB4D01218CFDB58DFA5D948BDDBBF2BB89301F2081AAD40AA7354DB345A86CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c721f34e8c7e63dd350dcf89bd773ef94a7528849a216fab22d5a39c01f5be7
                                                                      • Instruction ID: 140a462f1b7222c7dafb0f2d9b248716d797b1b48ccff4cd9523db5f0a8ed79c
                                                                      • Opcode Fuzzy Hash: 1c721f34e8c7e63dd350dcf89bd773ef94a7528849a216fab22d5a39c01f5be7
                                                                      • Instruction Fuzzy Hash: B9510F74D05218CFDF18DFA5E5887ECBBB2BF49305F249429E401AB2A4C7789A86CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 05D866EC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateProcessUser
                                                                      • String ID: u$l
                                                                      • API String ID: 2217836671-2838452502
                                                                      • Opcode ID: 235933168def5557938b65eaf66e5145f930087b516edbdcf94f7cee923ec413
                                                                      • Instruction ID: 745bd45939fbf9f650c7638dbb900cbcee667d677f56b9de5c970c252058baa1
                                                                      • Opcode Fuzzy Hash: 235933168def5557938b65eaf66e5145f930087b516edbdcf94f7cee923ec413
                                                                      • Instruction Fuzzy Hash: 9691E174D0426D8FCF21CFA8C880BEDBBB5BB59314F0494AAE549B7210DB349A85CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 05D894D3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: MemoryProcessWrite
                                                                      • String ID: u$l
                                                                      • API String ID: 3559483778-2838452502
                                                                      • Opcode ID: 216cd6e805c1eb435dd7254b997cc2f96588a05a0b344090bc5b68dfc1dc4745
                                                                      • Instruction ID: 8f3b8d26627e8e2dd3c3eb3009df2ccaf1c64e1e514d98a53372ba6a3f867dbc
                                                                      • Opcode Fuzzy Hash: 216cd6e805c1eb435dd7254b997cc2f96588a05a0b344090bc5b68dfc1dc4745
                                                                      • Instruction Fuzzy Hash: 3F41C9B4D052589FCF00CFA9D980AEEFBF1BB49314F14902AE819BB200D735AA45CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 05D894D3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: MemoryProcessWrite
                                                                      • String ID: u$l
                                                                      • API String ID: 3559483778-2838452502
                                                                      • Opcode ID: 0b95f78ae0b9a48628108e3c43584decfc72294bd547832b23f1bc15c5ea0b74
                                                                      • Instruction ID: 45696906346b14aeb2d447c82fc4b8d3c60faf79799517a2c1c6cadaf83d7f92
                                                                      • Opcode Fuzzy Hash: 0b95f78ae0b9a48628108e3c43584decfc72294bd547832b23f1bc15c5ea0b74
                                                                      • Instruction Fuzzy Hash: F041B8B4D012589FCF00CFA9D984AEEFBF1BB49314F10902AE819BB200D734AA45CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 05D89092
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID: u$l
                                                                      • API String ID: 4275171209-2838452502
                                                                      • Opcode ID: f76f05f163a69fbf9e9c63cb84b509ede0e2b243737a03baa73a3b54edd251e8
                                                                      • Instruction ID: 99733d1be30d1222e3c987fa696741dbcca16fe2bcb4ac3eb807cf395561fc8a
                                                                      • Opcode Fuzzy Hash: f76f05f163a69fbf9e9c63cb84b509ede0e2b243737a03baa73a3b54edd251e8
                                                                      • Instruction Fuzzy Hash: FF4178B9E042589FCF10CFA9D880AEEFBB1BB49310F10942AE815BB610D735A946CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 05D89092
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID: u$l
                                                                      • API String ID: 4275171209-2838452502
                                                                      • Opcode ID: 0c205fe34ea65eb102afc3a4a8f13fb8a0c0eace9756ee4b282b4866c7b51969
                                                                      • Instruction ID: 7f401434cfcffebebfb4683a9c611640963e18bd83600460c68fd1dada696d98
                                                                      • Opcode Fuzzy Hash: 0c205fe34ea65eb102afc3a4a8f13fb8a0c0eace9756ee4b282b4866c7b51969
                                                                      • Instruction Fuzzy Hash: F53197B9D042589FCF10CFA9D880AEEFBB5BB49310F10942AE915BB310D735A945CF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • GetThreadContext.KERNEL32(?,?), ref: 05D8859F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ContextThread
                                                                      • String ID: u$l
                                                                      • API String ID: 1591575202-2838452502
                                                                      • Opcode ID: 1e0017373f6463404f66e7b21e0f249b5d9fb5487b9eca37022aa3437251d5af
                                                                      • Instruction ID: f7d6453c65511f1aa127f019418e84aeba06e84da86f941bbe71a1ef12eb6600
                                                                      • Opcode Fuzzy Hash: 1e0017373f6463404f66e7b21e0f249b5d9fb5487b9eca37022aa3437251d5af
                                                                      • Instruction Fuzzy Hash: 9C41CAB4D052989FCB10DFA9D884AEEFBF1BF49314F14842AE815BB640D738A949CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 0130D3FF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.595043066.0000000001300000.00000040.00000001.sdmp, Offset: 01300000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID: u$l
                                                                      • API String ID: 544645111-2838452502
                                                                      • Opcode ID: 2dd4e2bbe100fc38faffc2357d8c6b52887b797b24e588146cacb6575f902a75
                                                                      • Instruction ID: 64d4da4e96ce19f73371691efeba6955286c6f11a131b50414e222165e5493be
                                                                      • Opcode Fuzzy Hash: 2dd4e2bbe100fc38faffc2357d8c6b52887b797b24e588146cacb6575f902a75
                                                                      • Instruction Fuzzy Hash: C03197B9D002589FCB10CFE9E984AEEFBF0AB19314F14902AE814B7250D735AA45CF64
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetThreadContext.KERNEL32(?,?), ref: 05D898FF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ContextThread
                                                                      • String ID: u$l
                                                                      • API String ID: 1591575202-2838452502
                                                                      • Opcode ID: 4d7bb01fc1ac1276f9ee25081e2b5d5d98077e1e7e02384bde2a2bd426dfc9c1
                                                                      • Instruction ID: 97f74800d37505dea597617334ec58cc628586916304e32116491b615c7a10c6
                                                                      • Opcode Fuzzy Hash: 4d7bb01fc1ac1276f9ee25081e2b5d5d98077e1e7e02384bde2a2bd426dfc9c1
                                                                      • Instruction Fuzzy Hash: 4341CBB4D042589FCB10DFA9D884AEEBBF1BB48314F14842AE459B7210D739A945CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 0130D3FF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.595043066.0000000001300000.00000040.00000001.sdmp, Offset: 01300000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID: u$l
                                                                      • API String ID: 544645111-2838452502
                                                                      • Opcode ID: bfa0fbdb362208e94c8128a0e3a5d543fc132bfd531ac8c50fb8877ba9aec3ba
                                                                      • Instruction ID: 76eac851a6b304b189824e9475937e4625b21e65d774a87ca0e9e6502291cacc
                                                                      • Opcode Fuzzy Hash: bfa0fbdb362208e94c8128a0e3a5d543fc132bfd531ac8c50fb8877ba9aec3ba
                                                                      • Instruction Fuzzy Hash: B53195B9D042589FCB10CFE9E884ADEFBF4AB19314F14902AE814B7250D735A945CFA4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • GetThreadContext.KERNEL32(?,?), ref: 05D8859F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ContextThread
                                                                      • String ID: u$l
                                                                      • API String ID: 1591575202-2838452502
                                                                      • Opcode ID: 18817c29a9e9d26a874d94aedfd82575f3bc153c3f9cb1a4215bb2a241d846a1
                                                                      • Instruction ID: 53b3bb194290a910508e959c78b0fe7628671bb3607e78e27d9cd6b8d14a3c1b
                                                                      • Opcode Fuzzy Hash: 18817c29a9e9d26a874d94aedfd82575f3bc153c3f9cb1a4215bb2a241d846a1
                                                                      • Instruction Fuzzy Hash: C431ABB5D052589FCB10DFA9D884AEEFBF1BF49314F14842AE815B7240D738A949CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetThreadContext.KERNEL32(?,?), ref: 05D898FF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ContextThread
                                                                      • String ID: u$l
                                                                      • API String ID: 1591575202-2838452502
                                                                      • Opcode ID: 6ef7f63d3a717be1ffd7198185fe500668283d98c1637b78e98448624177a99c
                                                                      • Instruction ID: 87bbcb23ca10b05924c4d5fc9c927d11bdc04399a2545c15818a6cdab0eebbdb
                                                                      • Opcode Fuzzy Hash: 6ef7f63d3a717be1ffd7198185fe500668283d98c1637b78e98448624177a99c
                                                                      • Instruction Fuzzy Hash: 2A31BBB4D04258DFCB10DFA9D884AEEBBF1BB49314F14842AE455B7240D738A945CF54
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ResumeThread
                                                                      • String ID: u$l
                                                                      • API String ID: 947044025-2838452502
                                                                      • Opcode ID: df87b656a9c1dac337f1cb7212721994bc193085366b5b5c0a5e0d80daf96db0
                                                                      • Instruction ID: d272f1e76e59e0f1cfd7c52d680cff016b3ea6d4145e1ae0c829a34a27bcf680
                                                                      • Opcode Fuzzy Hash: df87b656a9c1dac337f1cb7212721994bc193085366b5b5c0a5e0d80daf96db0
                                                                      • Instruction Fuzzy Hash: CF31B8B4D052589FCF10CFA9E884AEEFBB5AF49324F14842AE815B7710CB35A845CF55
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.607134549.0000000005D80000.00000040.00000001.sdmp, Offset: 05D80000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ResumeThread
                                                                      • String ID: u$l
                                                                      • API String ID: 947044025-2838452502
                                                                      • Opcode ID: c363baa5eeaba9009b3b2b6233a395b8f66ec50548fd461c6fd8be78d58fe2ba
                                                                      • Instruction ID: 630e900282e171b981798b461452542e4c428e1ce4c9c8df20e37425f2350740
                                                                      • Opcode Fuzzy Hash: c363baa5eeaba9009b3b2b6233a395b8f66ec50548fd461c6fd8be78d58fe2ba
                                                                      • Instruction Fuzzy Hash: 4831C7B4D042189FCF10CFA9E880AEEFBB5AB49314F14842AE815B7300CB35A801CFA4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: u$l$u$l
                                                                      • API String ID: 0-1870257316
                                                                      • Opcode ID: 6d1a33bbac4cc48ef9b91e04df39f0efb458444f76fc309800f2f7aee58024cb
                                                                      • Instruction ID: 15f39ec05f00a093547f4481f1473c74df22ef5e43d41c1ecd39e4e3dd15d12f
                                                                      • Opcode Fuzzy Hash: 6d1a33bbac4cc48ef9b91e04df39f0efb458444f76fc309800f2f7aee58024cb
                                                                      • Instruction Fuzzy Hash: C451CCB0D042089FDF24CFA9D984B9DBBF1BB49304F208429E459AB350DB34A946CF94
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: u$l$u$l
                                                                      • API String ID: 0-1870257316
                                                                      • Opcode ID: 3fca76fd4156dc767fcc11f679778b1481296c504f983ac5f5a0fab932773692
                                                                      • Instruction ID: 2ba939a7dc7f7a949e81fd2db2147eabbe7488d0036d1db3383615d0012ee85d
                                                                      • Opcode Fuzzy Hash: 3fca76fd4156dc767fcc11f679778b1481296c504f983ac5f5a0fab932773692
                                                                      • Instruction Fuzzy Hash: 8A51EDB0D052489FDF24CFA9E984B9DFBF1BB49304F209429E459AB350DB34A946CF45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 28e9ff7ebf0a05804b58daf79f85355333ffce525c9db38c10dd95fb98e8e93a
                                                                      • Instruction ID: 387c3cac89b62da6942d2ddd29f952268d3244da23d20b9f79d67cd95fdf0197
                                                                      • Opcode Fuzzy Hash: 28e9ff7ebf0a05804b58daf79f85355333ffce525c9db38c10dd95fb98e8e93a
                                                                      • Instruction Fuzzy Hash: D051C274E002489FCB08DFA9C484ADDFBF6BF88314F15C569D905AB365DB34A941CB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 484f3c2cc2b3a14b308d8ebd1e109d1fb6b9f18498963bb25a72f46b4a95f32c
                                                                      • Instruction ID: fce08012ae912d1c4322bd24a6982601428347c264fb9e8afa3561dbb516d3b2
                                                                      • Opcode Fuzzy Hash: 484f3c2cc2b3a14b308d8ebd1e109d1fb6b9f18498963bb25a72f46b4a95f32c
                                                                      • Instruction Fuzzy Hash: 6451E074E05248CFCB09DFA8E4906EDBFB2AB49304F20846AE815BB355DB359A46CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 58ec6bfde82b25ccdb2a5e9b3b2043adc66c2f7865c8dc0e2819af3ae3567a22
                                                                      • Instruction ID: 9521455fabb3a44cdff984bd1e0673cdbf9a410b7f7412de5e87d8b4ba97c910
                                                                      • Opcode Fuzzy Hash: 58ec6bfde82b25ccdb2a5e9b3b2043adc66c2f7865c8dc0e2819af3ae3567a22
                                                                      • Instruction Fuzzy Hash: 424181349093889FCB06CBB8D8606DDBFB1AF4A214F1980EBD444EB662D7359845CB62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bf60f78195a870deb78b19ab173069bb50b4911ff0014d747ccf1e40fcc5443c
                                                                      • Instruction ID: 5f7725cefb25c1d476ab8bca8c2c123991916ec0a192c3897f2d3d8b76f517a3
                                                                      • Opcode Fuzzy Hash: bf60f78195a870deb78b19ab173069bb50b4911ff0014d747ccf1e40fcc5443c
                                                                      • Instruction Fuzzy Hash: F8419074D01208DFCB08DFA8E494AEDBBB1FB49304F20852AE815BB354DB756946CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 797c7afbcd87565d1965b926c6d085fd203d865ad34254a43aeab21cfed9ca63
                                                                      • Instruction ID: 5209264a710eee7573d1aa9c299b5b08ce978616b0da250c0d5482b816b5c365
                                                                      • Opcode Fuzzy Hash: 797c7afbcd87565d1965b926c6d085fd203d865ad34254a43aeab21cfed9ca63
                                                                      • Instruction Fuzzy Hash: 53419E74E01208CFCB09DFA8E5946EDBBB2FB49304F20852AE815BB354DB759946CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23df77b1c775391a033bb39ca06cca0ac63ea7f3bb3d7746545a5d3d92e54eee
                                                                      • Instruction ID: 559871c8ba951ac6a682a70d3a067c4a368c73b88854683017f8eed63604e924
                                                                      • Opcode Fuzzy Hash: 23df77b1c775391a033bb39ca06cca0ac63ea7f3bb3d7746545a5d3d92e54eee
                                                                      • Instruction Fuzzy Hash: 7B414275D19209CFDF08DFA4E8487EEBBB6FB49305F108429E011A7290DB795A85CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d1c2fadbdb178946be80a5c22ca959f4d4800cac8b819c9206780c567bf304c3
                                                                      • Instruction ID: 3632703082406b3dd974cd06d887f648d26426dadda3c93c3a49d163da38215e
                                                                      • Opcode Fuzzy Hash: d1c2fadbdb178946be80a5c22ca959f4d4800cac8b819c9206780c567bf304c3
                                                                      • Instruction Fuzzy Hash: F2314770E042098FDF08CFAAC5456EEFBF2AF89304F14C5AAD404A7251CB388A85CB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8a07cb9d4d84d56761eeec934fffd9fa6c3f3a66a91d957dd7934fdc8fd96f5b
                                                                      • Instruction ID: 0169fd78d418ce9a990c28f48a7064dacfaf94f00c71f8192f4822c7510043cb
                                                                      • Opcode Fuzzy Hash: 8a07cb9d4d84d56761eeec934fffd9fa6c3f3a66a91d957dd7934fdc8fd96f5b
                                                                      • Instruction Fuzzy Hash: 373105B4D0421A8BCF08DFE9C9859EEFBF6BF48304B19CA95D414A7205D7349941CBA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fc94632c2eef7de0b960adebc2ae545994ddd12eb1e7fe7fdf8e71578a2360d7
                                                                      • Instruction ID: e7d2817b035ead9de3d352e2d88b09d8a2eb07b265ba10536b8f1821d0b722c0
                                                                      • Opcode Fuzzy Hash: fc94632c2eef7de0b960adebc2ae545994ddd12eb1e7fe7fdf8e71578a2360d7
                                                                      • Instruction Fuzzy Hash: 4E31D378E002099FCB08DFA9D8845EEFBB6FF88314F14856AE915A7310DB345941CFA0
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 06748090c6fd8e274302ecee9ad92d9c2cb7eedc8911e717cc70af0f3da1369a
                                                                      • Instruction ID: 3d7f1557a79b1aea7963fabec4132f7173048150c3b5c759c6d4e00f27400338
                                                                      • Opcode Fuzzy Hash: 06748090c6fd8e274302ecee9ad92d9c2cb7eedc8911e717cc70af0f3da1369a
                                                                      • Instruction Fuzzy Hash: FE210478E152199FCB08CFA9D9446DDBBF2BF89304F14856AE405E7320DB345A46CF51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b3bceaa6ef4d092951de0bfbb2925c43655a48c7f94b2815486ef9e2aa5e042
                                                                      • Instruction ID: ce9c493e1ed203d43bc08be24cd8753d612170e908382f7faee0f0e1933bb6be
                                                                      • Opcode Fuzzy Hash: 6b3bceaa6ef4d092951de0bfbb2925c43655a48c7f94b2815486ef9e2aa5e042
                                                                      • Instruction Fuzzy Hash: BE216775C05208DFDB04DFA0E9087EEBFB1FB04309F10446AE411AB280CB795A86CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9abf7f9fef288b75c2f9a2a95866c00c90009f998f35bb6af54b4f12ebd0572f
                                                                      • Instruction ID: 06cdaa2b1116a6f16efe7d4889ca2639b932e8ef606bf95c8612eb3e95af0d45
                                                                      • Opcode Fuzzy Hash: 9abf7f9fef288b75c2f9a2a95866c00c90009f998f35bb6af54b4f12ebd0572f
                                                                      • Instruction Fuzzy Hash: CD118E70A50249AFCB44EFB8D946AEE7BB1EB81308F508A58E415FB245DF746E41CF80
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 31a308aa8eb7182f0163acbdacc1c9beda0f3dfeb7716989f7541d359d808174
                                                                      • Instruction ID: 34451efb14f45290b26bb27d077beee5c552a601bde28336ae935a29c4f78649
                                                                      • Opcode Fuzzy Hash: 31a308aa8eb7182f0163acbdacc1c9beda0f3dfeb7716989f7541d359d808174
                                                                      • Instruction Fuzzy Hash: 76116070E10209AFCB44EFB8D9456EE7BF5EB84208F108969D009FB244DB706E45CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ff9c079831d75fe0a51504811236b930b4f2990e8bcc4a68592a672b2914785d
                                                                      • Instruction ID: dfbf30257669f7fafbe3c3c1c61c30b7fde75b4f682076ab9bbaaaa65b6df79e
                                                                      • Opcode Fuzzy Hash: ff9c079831d75fe0a51504811236b930b4f2990e8bcc4a68592a672b2914785d
                                                                      • Instruction Fuzzy Hash: 5A1156B0D0420A9FCB44DFA8D5416AEFFB1BB49204F2085AA9418B7381EB346A06CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6103d5bbad3b8b9a32857402488e8922c68adfbb6ac05bc6dbeec40c5c00033f
                                                                      • Instruction ID: 5b3145366067923fd92e9031bd5bd1bb6ea61bb849d5e51c0a32f5f113351f7d
                                                                      • Opcode Fuzzy Hash: 6103d5bbad3b8b9a32857402488e8922c68adfbb6ac05bc6dbeec40c5c00033f
                                                                      • Instruction Fuzzy Hash: 54216AB0C04249DFCB19CFA4D1593ADBFB0BB09305F2484ADD411AB281CB7D5A86CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 243daa8687c80fede0093922aa0866c84fd0b14acc93459365ca55e438d7d3e9
                                                                      • Instruction ID: a0a07d7b13ffb5da74459379a061d5d71e2f927f14a2e78bd63f8c773ee8e621
                                                                      • Opcode Fuzzy Hash: 243daa8687c80fede0093922aa0866c84fd0b14acc93459365ca55e438d7d3e9
                                                                      • Instruction Fuzzy Hash: 5E11D4B4D0020A9FCB44DFE8D5816AEFBF5BF48205F2085699418F7340EB34AA45CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 66f5fc2adb8e98a62e5ffb8ac6fd0972e999ca79526e6bae8762339fdeed7653
                                                                      • Instruction ID: 93492671c995a291894d1c32400dbc014a721fa518c9b7c70e1b2bb5cf805915
                                                                      • Opcode Fuzzy Hash: 66f5fc2adb8e98a62e5ffb8ac6fd0972e999ca79526e6bae8762339fdeed7653
                                                                      • Instruction Fuzzy Hash: B6019E70E0424A9FCB18DFA8D4519EEBFB2EF49304F2085AAD415AB391DB355A41CB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e53ea6fad1792061d19195b73beebe0bf652549902ffb719c9bf3e308e1b475
                                                                      • Instruction ID: fdc33275de225b670b79ac9e83514f0e1929f07cf63a5798aaaf6207f0f833e3
                                                                      • Opcode Fuzzy Hash: 3e53ea6fad1792061d19195b73beebe0bf652549902ffb719c9bf3e308e1b475
                                                                      • Instruction Fuzzy Hash: BC01C070D043499FCB18DFB8D4001AEBFB1AF45304F2085AEC414A7742DB391A41CB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08f508373d88d334d5876f8d9628a58265a1177b809c123a7f830c2548e0d114
                                                                      • Instruction ID: 2868e190ea572b4ace054bed73709f8786406984a9478023e3f5a501d0d74bef
                                                                      • Opcode Fuzzy Hash: 08f508373d88d334d5876f8d9628a58265a1177b809c123a7f830c2548e0d114
                                                                      • Instruction Fuzzy Hash: A1F0FF309082489FCF09DBE4D0412EEBFF5AB46304F2082EAD855AB2A2DB341B05DB02
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9838d4da15f27199edb0d0411a24ed5fe4c5ce134763e8cfdeb8f63c4fa37d85
                                                                      • Instruction ID: b1f64ea94679dc514c461ba41978099aea0ff49f21ce30b87acfd81ca1f9b02f
                                                                      • Opcode Fuzzy Hash: 9838d4da15f27199edb0d0411a24ed5fe4c5ce134763e8cfdeb8f63c4fa37d85
                                                                      • Instruction Fuzzy Hash: EBF01D34E0820CAFCB44EFE9D04569EBBF9EB84304F1081A9D505A7250EB345A449B41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b82cd75baf4fcef9dd6de7812a151cd103e7d68e2a37f8c644f5b0e132cbd6d
                                                                      • Instruction ID: 11a997cd64a884a15a260e1523bc9775affff7d6a50029732fb792c6d16075b4
                                                                      • Opcode Fuzzy Hash: 0b82cd75baf4fcef9dd6de7812a151cd103e7d68e2a37f8c644f5b0e132cbd6d
                                                                      • Instruction Fuzzy Hash: 4EE04F3400EBC09FCB13DB74E85C1487F74EB2221670504ADE486C6463CB64094DEF22
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: df223abff85028369200c0271347939b09900994b4588d3e0ce611e5b528e86f
                                                                      • Instruction ID: 313e7ed95cbd400aecefbca37468585efd9789e566a8c4e255cf64c26fe5bd86
                                                                      • Opcode Fuzzy Hash: df223abff85028369200c0271347939b09900994b4588d3e0ce611e5b528e86f
                                                                      • Instruction Fuzzy Hash: BBD09238015E049FCA04ABA4F94C2193AA8FB20206B80046CE14B810638F605A8AEF65
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Non-executed Functions

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000012.00000002.606368880.0000000005190000.00000040.00000001.sdmp, Offset: 05190000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: u$l$<$ntin$ntin
                                                                      • API String ID: 0-549284935
                                                                      • Opcode ID: a3fb2704efa21b94aca8586cc76a75fbe11f183a664074c717da77344351c2f3
                                                                      • Instruction ID: e051e45b05b9d16af67808bf78f607b45cd07c32c20968798cdbc8b6636b2d4e
                                                                      • Opcode Fuzzy Hash: a3fb2704efa21b94aca8586cc76a75fbe11f183a664074c717da77344351c2f3
                                                                      • Instruction Fuzzy Hash: 15E1A3B5E046198FDB58CFAAC985ADEFBF2BF88300F14C0A9D508AB365DB3459418F51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Executed Functions

                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.605751938.00000000060F0000.00000040.00000001.sdmp, Offset: 060F0000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e46dd616cf4ff502e4b4811c4a179b4fc1cbe8e7b5a5056493e54d53575a4fc3
                                                                      • Instruction ID: 4040bf1f8086469f268a193542271cceea824dc2b27727890d55cb698e531b03
                                                                      • Opcode Fuzzy Hash: e46dd616cf4ff502e4b4811c4a179b4fc1cbe8e7b5a5056493e54d53575a4fc3
                                                                      • Instruction Fuzzy Hash: 378177B1D142098FDB54CFA9C8806DEFFB1FF88314F10852AE915AB640DB71A989CB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 02A7962E
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: ce316d1c73faf1762ba082494a0dd94de63ceb0ac3503e6fa9654e7d33665522
                                                                      • Instruction ID: 1204a4fa9973ee8914f1648c439dc547bc33b94811920a293422bd126fa27bc7
                                                                      • Opcode Fuzzy Hash: ce316d1c73faf1762ba082494a0dd94de63ceb0ac3503e6fa9654e7d33665522
                                                                      • Instruction Fuzzy Hash: A1713670A00B068FD724DF2AD98475BB7F5BF88204F008A2ED48AD7A50DB34E845CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02A7FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 19fc693ceec7bfc1ccb8d69ea97f785d596e7e0704b9d9052115cc5b05b7f62d
                                                                      • Instruction ID: ee4386f9f8cc28794afd857ea029214bd0d571353dbde12ae2320af5b3154e73
                                                                      • Opcode Fuzzy Hash: 19fc693ceec7bfc1ccb8d69ea97f785d596e7e0704b9d9052115cc5b05b7f62d
                                                                      • Instruction Fuzzy Hash: F551F0B1D04249AFDF11CFA9C980ADDBFB2BF49304F24816AE808AB261D7759955CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 060F3568
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.605751938.00000000060F0000.00000040.00000001.sdmp, Offset: 060F0000, based on PE: false
                                                                      Similarity
                                                                      • API ID: Query_
                                                                      • String ID:
                                                                      • API String ID: 428220571-0
                                                                      • Opcode ID: 5d169e0cb4f618c9e9f2014859f94ce0c7f70769602971aef1d7717775d1ec64
                                                                      • Instruction ID: 57bb6cbf1424a4c77175bd46896287bda68710bb92d32185816d8bf6f0da4454
                                                                      • Opcode Fuzzy Hash: 5d169e0cb4f618c9e9f2014859f94ce0c7f70769602971aef1d7717775d1ec64
                                                                      • Instruction Fuzzy Hash: A85135B0D102589FDF64CFA9C980ADEBBB1FF48314F148129E814AB650DB75A986CF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02A7FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: ab352dab24f53ea1ba3b70791ba1ea8363a5b57d71b842f69c58dd3792ffc347
                                                                      • Instruction ID: 0f0581a67d36434254081a0d9f51af636a881ec629da11182a9dc1178bebfe1c
                                                                      • Opcode Fuzzy Hash: ab352dab24f53ea1ba3b70791ba1ea8363a5b57d71b842f69c58dd3792ffc347
                                                                      • Instruction Fuzzy Hash: 665104B1D003499FDF14CFA9C980ADDBBB1FF49304F24816AE805AB251DB749985CF90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02A7FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: 3f1a5cf14ecddb401ede3856f49e1184552c88a6170688d168908924f791277b
                                                                      • Instruction ID: 9101748ce3e804ecbf2a183747ddb288fa279fef1165eb284bca92027401f6d4
                                                                      • Opcode Fuzzy Hash: 3f1a5cf14ecddb401ede3856f49e1184552c88a6170688d168908924f791277b
                                                                      • Instruction Fuzzy Hash: 8851F2B1D043499FDF14CFA9C990ADEBFB1BF48314F24812AE819AB211DB749985CF94
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02A7FD0A
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: CreateWindow
                                                                      • String ID:
                                                                      • API String ID: 716092398-0
                                                                      • Opcode ID: d4453d9589932a6d8cc05ed2dc61a24e25fb5324b3b5d9a05eb4a3581a715ab1
                                                                      • Instruction ID: 43782724642b69bf27d4d53873fe3233f8c7a3b5503dd43af39b4a41aa979698
                                                                      • Opcode Fuzzy Hash: d4453d9589932a6d8cc05ed2dc61a24e25fb5324b3b5d9a05eb4a3581a715ab1
                                                                      • Instruction Fuzzy Hash: 1351B1B1D00309AFDF14CF99C984ADEBBB5BF48314F24812AE819AB211DB749945CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • RegisterClassW.USER32(00000000), ref: 02A7F9F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ClassRegister
                                                                      • String ID:
                                                                      • API String ID: 2764894006-0
                                                                      • Opcode ID: cac4310191e4fc2dee9994e417020c56b0109cc75555e5608f5275fef23c4f5c
                                                                      • Instruction ID: 4d30072e3d131edd2ddd826237131fd555cce4c400c796a5f6acbafd85c09ebd
                                                                      • Opcode Fuzzy Hash: cac4310191e4fc2dee9994e417020c56b0109cc75555e5608f5275fef23c4f5c
                                                                      • Instruction Fuzzy Hash: 3A410270D1074AEFCB14CFA9C8847DEBBB1BF89304F24861AE414A7650EB74A585CB95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • RegisterClassW.USER32(00000000), ref: 02A7F9F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: ClassRegister
                                                                      • String ID:
                                                                      • API String ID: 2764894006-0
                                                                      • Opcode ID: 33ee8235fe546e6a3a1487f292cfa7a4ae6542f65321245f81962ebb16206d43
                                                                      • Instruction ID: a672dcf4993cfb7ed64dc31abe79c20e9247d9f556f3d989ef2d279aaa779776
                                                                      • Opcode Fuzzy Hash: 33ee8235fe546e6a3a1487f292cfa7a4ae6542f65321245f81962ebb16206d43
                                                                      • Instruction Fuzzy Hash: DB4130B0D1074ADFCB14CFA9C8847DEBBB1BF89304F24861AE814A7650EB749586CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02A7BCC6,?,?,?,?,?), ref: 02A7BD87
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: e925979b7d788dcdd9982b4acab893ea907232a9e31cf81421e5860c5eb45771
                                                                      • Instruction ID: c4c41200022593688f919c876ffc09c62c18c10a6ec05a0873acdaa9596318b0
                                                                      • Opcode Fuzzy Hash: e925979b7d788dcdd9982b4acab893ea907232a9e31cf81421e5860c5eb45771
                                                                      • Instruction Fuzzy Hash: 142116B5900348AFDB10CF99D984AEEBBF4EB48314F14841AE914A7311D774A944CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02A7BCC6,?,?,?,?,?), ref: 02A7BD87
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: DuplicateHandle
                                                                      • String ID:
                                                                      • API String ID: 3793708945-0
                                                                      • Opcode ID: d23d534b355c27ba88359d3eb91c6386ffe9f11793d344867aa996920f08e56e
                                                                      • Instruction ID: 6d415b65abda570664c8d69dedbd91ae427243ebd6e2cd1864b8c1ffb2dbbcf6
                                                                      • Opcode Fuzzy Hash: d23d534b355c27ba88359d3eb91c6386ffe9f11793d344867aa996920f08e56e
                                                                      • Instruction Fuzzy Hash: 562114B5900348AFCB10CFA9D984ADEBFF4EF48324F14841AE954A7351D778A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02A796A9,00000800,00000000,00000000), ref: 02A798BA
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 9164534ab9e305860b7496483e8a6dc14eada0cc9448c2b33f72122b9bcd8b70
                                                                      • Instruction ID: a2e75ad95a092797272cdf1cc43f419a0a710edfdea2131ab8f6b3f469f77931
                                                                      • Opcode Fuzzy Hash: 9164534ab9e305860b7496483e8a6dc14eada0cc9448c2b33f72122b9bcd8b70
                                                                      • Instruction Fuzzy Hash: DC1103B69002499FDB10CF9AC844ADEFBF4EB48324F04842ED919A7600C775A945CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02A796A9,00000800,00000000,00000000), ref: 02A798BA
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 11b10fa701ce134374fe071f35ee848f7c5f4b7c4d449cf5c798c17455f50579
                                                                      • Instruction ID: 9e991a54ce8ee7f718263faebe84caed6c1fe3b0f681393cab7458f540bf4f8e
                                                                      • Opcode Fuzzy Hash: 11b10fa701ce134374fe071f35ee848f7c5f4b7c4d449cf5c798c17455f50579
                                                                      • Instruction Fuzzy Hash: 3C1117B1D003499FCB10CF9AD844ADEFBF4EB49314F14841AD415A7600C775A545CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 02A7962E
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: HandleModule
                                                                      • String ID:
                                                                      • API String ID: 4139908857-0
                                                                      • Opcode ID: 1d2047171a8c7687da4f992cb3d7d179a2ccfc47fa7320a63e0e107997a780ea
                                                                      • Instruction ID: 53e808652f06f8530299a10a6c060c829f8d7769e79c217bae9dff87074f3c97
                                                                      • Opcode Fuzzy Hash: 1d2047171a8c7687da4f992cb3d7d179a2ccfc47fa7320a63e0e107997a780ea
                                                                      • Instruction Fuzzy Hash: 081110B1D002498FCB20CF9AC844BDFFBF8AF88224F10851AD819A7210D778A545CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02A7FE28,?,?,?,?), ref: 02A7FE9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: 0249732bc383a71b84d9cee84a8a00f6766bd839fc570b7b9b7ab7d258bc0e6b
                                                                      • Instruction ID: 204eb71921591fcaade949fa191c0e723f5365dab0e26b9b239c94f49de1a118
                                                                      • Opcode Fuzzy Hash: 0249732bc383a71b84d9cee84a8a00f6766bd839fc570b7b9b7ab7d258bc0e6b
                                                                      • Instruction Fuzzy Hash: D71136B19002489FDB10CF89C584BDFBBF8EB48324F108459E918A7741C374A944CFA5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02A7FE28,?,?,?,?), ref: 02A7FE9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.595913910.0000000002A70000.00000040.00000001.sdmp, Offset: 02A70000, based on PE: false
                                                                      Similarity
                                                                      • API ID: LongWindow
                                                                      • String ID:
                                                                      • API String ID: 1378638983-0
                                                                      • Opcode ID: 8e8fa3cff370c6ad7874f9722fec7504fb83a518f76d767d33820ce3a47d6122
                                                                      • Instruction ID: d20b79d06911a79bed8fe3cdb976103b7380ca0d036ae257d7753cab063b358d
                                                                      • Opcode Fuzzy Hash: 8e8fa3cff370c6ad7874f9722fec7504fb83a518f76d767d33820ce3a47d6122
                                                                      • Instruction Fuzzy Hash: 581136B18002489FCB10CF99D585BDFFBF8EB48324F10844AD858A3741C374AA44CFA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.594470353.00000000010DD000.00000040.00000001.sdmp, Offset: 010DD000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c8ff6d1a1c372baacdc1c4897e100d7f8edc60684dd3d3e10518b6ddbf09f4b2
                                                                      • Instruction ID: cb003665e1483513ca99fc3cfcd15ed7bcad0f2562d1f134c960b165eb95d11a
                                                                      • Opcode Fuzzy Hash: c8ff6d1a1c372baacdc1c4897e100d7f8edc60684dd3d3e10518b6ddbf09f4b2
                                                                      • Instruction Fuzzy Hash: 94212871504340DFDF11DF98D9C0B5BBFA5FB88328F2485A9D9450B28AC736D856C7A1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.594618937.00000000010ED000.00000040.00000001.sdmp, Offset: 010ED000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 497b07994c8d516fdbc7a1e94f3388d7b64c901f99df04d015d6f503573d4081
                                                                      • Instruction ID: 9cf3332f33810f021b365588417607704654166d5f09d455366e3802ecc9ce92
                                                                      • Opcode Fuzzy Hash: 497b07994c8d516fdbc7a1e94f3388d7b64c901f99df04d015d6f503573d4081
                                                                      • Instruction Fuzzy Hash: 12210371504200DFCB11DF94D4C8B16BFE5FB84354F28C9A9E8894B246C336D847CB61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.594618937.00000000010ED000.00000040.00000001.sdmp, Offset: 010ED000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: adf233cb78ef9a9e563f8c3476cea8606e2df59f465f309e9bb4ed6429c4a6b4
                                                                      • Instruction ID: 1d8bd2957558c256988923bb2853406220d471ad7c603aa3f4145d6773f59ee2
                                                                      • Opcode Fuzzy Hash: adf233cb78ef9a9e563f8c3476cea8606e2df59f465f309e9bb4ed6429c4a6b4
                                                                      • Instruction Fuzzy Hash: A72192755093808FCB13CF64D994B15BFB1EB46214F28C5DAD8898F657C33A984ACB62
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000016.00000002.594470353.00000000010DD000.00000040.00000001.sdmp, Offset: 010DD000, based on PE: false
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90825e81fda1175a189452765487cd28cd30970da8754c189eaf9e16a5c9c767
                                                                      • Instruction ID: 95d44b88f005a9673af61fa9ef0569f8cc38b8dd4eaaaf0549dedd52c350e353
                                                                      • Opcode Fuzzy Hash: 90825e81fda1175a189452765487cd28cd30970da8754c189eaf9e16a5c9c767
                                                                      • Instruction Fuzzy Hash: A211B176404380DFDB12CF54D9C4B16BFB1FB84324F24C6A9D9450B65AC336D45ACBA2
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Non-executed Functions