Loading ...

Play interactive tourEdit tour

Analysis Report DHLHAWB 57462839.exe

Overview

General Information

Sample Name:DHLHAWB 57462839.exe
Analysis ID:358351
MD5:83a8eaa2ef938a73daacebcd4e090843
SHA1:817203c16a790450a754dc16cf59111dd2dadaa7
SHA256:5a0b3456792f8d0e1db3fa224863ccab694349f33cde1130bcf4436563ee0b2a
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
.NET source code contains very large strings
Contains functionality to register a low level keyboard hook
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • DHLHAWB 57462839.exe (PID: 3864 cmdline: 'C:\Users\user\Desktop\DHLHAWB 57462839.exe' MD5: 83A8EAA2EF938A73DAACEBCD4E090843)
    • schtasks.exe (PID: 5604 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 3984 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 5300 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "instrumentation@ogpscutter.comVuVW%xY7ceous2.smtp.mailhostbox.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.203348595.00000000028BD000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.DHLHAWB 57462839.exe.2870558.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                1.2.DHLHAWB 57462839.exe.3b02ff0.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.DHLHAWB 57462839.exe.3b02ff0.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                    Sigma Overview

                    System Summary:

                    barindex
                    Sigma detected: Scheduled temp file as task from temp locationShow sources
                    Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\DHLHAWB 57462839.exe' , ParentImage: C:\Users\user\Desktop\DHLHAWB 57462839.exe, ParentProcessId: 3864, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp', ProcessId: 5604

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Found malware configurationShow sources
                    Source: 1.2.DHLHAWB 57462839.exe.3b02ff0.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "instrumentation@ogpscutter.comVuVW%xY7ceous2.smtp.mailhostbox.com"}
                    Multi AV Scanner detection for dropped fileShow sources
                    Source: C:\Users\user\AppData\Roaming\AFpQKAcEJx.exeVirustotal: Detection: 15%Perma Link
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: DHLHAWB 57462839.exeVirustotal: Detection: 15%Perma Link
                    Machine Learning detection for dropped fileShow sources
                    Source: C:\Users\user\AppData\Roaming\AFpQKAcEJx.exeJoe Sandbox ML: detected
                    Machine Learning detection for sampleShow sources
                    Source: DHLHAWB 57462839.exeJoe Sandbox ML: detected
                    Source: 5.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                    Compliance:

                    barindex
                    Uses 32bit PE filesShow sources
                    Source: DHLHAWB 57462839.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                    Source: DHLHAWB 57462839.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: global trafficTCP traffic: 192.168.2.3:49740 -> 208.91.199.225:587
                    Source: global trafficTCP traffic: 192.168.2.3:49741 -> 208.91.199.223:587
                    Source: Joe Sandbox ViewIP Address: 208.91.199.225 208.91.199.225
                    Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                    Source: global trafficTCP traffic: 192.168.2.3:49740 -> 208.91.199.225:587
                    Source: global trafficTCP traffic: 192.168.2.3:49741 -> 208.91.199.223:587
                    Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://LAQlpY.com
                    Source: RegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: RegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000005.00000002.465664877.0000000002D52000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: RegSvcs.exe, 00000005.00000002.465602038.0000000002D48000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.465439616.0000000002D1A000.00000004.00000001.sdmpString found in binary or memory: https://AxCUzQTJay5lS.org
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                    Source: RegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    Key, Mouse, Clipboard, Microphone and Screen Capturing:

                    barindex
                    Contains functionality to register a low level keyboard hookShow sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E90BD8 SetWindowsHookExW 0000000D,00000000,?,?5_2_00E90BD8
                    Installs a global keyboard hookShow sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary:

                    barindex
                    .NET source code contains very large array initializationsShow sources
                    Source: 5.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bFFD06813u002d50BCu002d421Bu002dB421u002dC797EF24AE57u007d/F33157BAu002dA815u002d4EA0u002d8EC4u002d7193566406F7.csLarge array initialization: .cctor: array initializer size 11970
                    .NET source code contains very large stringsShow sources
                    Source: DHLHAWB 57462839.exe, frmSplashScreen.csLong String: Length: 13656
                    Source: AFpQKAcEJx.exe.1.dr, frmSplashScreen.csLong String: Length: 13656
                    Source: 1.2.DHLHAWB 57462839.exe.3c0000.0.unpack, frmSplashScreen.csLong String: Length: 13656
                    Source: 1.0.DHLHAWB 57462839.exe.3c0000.0.unpack, frmSplashScreen.csLong String: Length: 13656
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeCode function: 1_2_026896081_2_02689608
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeCode function: 1_2_0268C5261_2_0268C526
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeCode function: 1_2_0268AB341_2_0268AB34
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E268B85_2_00E268B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2C0F95_2_00E2C0F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2B4C75_2_00E2B4C7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2B81E5_2_00E2B81E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2B5715_2_00E2B571
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2B14F5_2_00E2B14F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E2B50F5_2_00E2B50F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E913585_2_00E91358
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E9C4E85_2_00E9C4E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB61185_2_00EB6118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC4A85_2_00EBC4A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB28E05_2_00EB28E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB78A85_2_00EB78A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB2D185_2_00EB2D18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB7F505_2_00EB7F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB00405_2_00EB0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB56785_2_00EB5678
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBCBE95_2_00EBCBE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBCCE85_2_00EBCCE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB4C985_2_00EB4C98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_028A46A05_2_028A46A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_028A46905_2_028A4690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_028AD3105_2_028AD310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06A22C585_2_06A22C58
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.205635961.0000000005960000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.205721355.0000000006000000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.202552896.000000000047E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAssemblyName.exe< vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203348595.00000000028BD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUkLGHnYyzfBxkGFJglrMQjaSFSPvcSH.exe4 vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.205859904.0000000006100000.00000002.00000001.sdmpBinary or memory string: originalfilename vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.205859904.0000000006100000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exeBinary or memory string: OriginalFilenameAssemblyName.exe< vs DHLHAWB 57462839.exe
                    Source: DHLHAWB 57462839.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 5.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 5.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: DHLHAWB 57462839.exe, frmSplashScreen.csBase64 encoded string: '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
                    Source: AFpQKAcEJx.exe.1.dr, frmSplashScreen.csBase64 encoded string: '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
                    Source: 1.2.DHLHAWB 57462839.exe.3c0000.0.unpack, frmSplashScreen.csBase64 encoded string: 'GIdDNNZNNNNRNNNN//8NNYtNNNNNNNNNDNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNtNNNNN4sht4NgNaAVotOGZ0uITucplOjpz9apzSgVTAuoz5iqPOvMFOlqJ4tnJ4tER9GVT1iMTHhQD0XWNNNNNNNNNODEDNNGNRQNViu868NNNNNNNNNNBNNNvRYNINNNPNNNNNTNNNNNNNNlw8NNNNtNNNNDNNNNNNNRDNtNNNNNtNNONNNNNNNNNNRNNNNNNNNNNPNNNNNNtNNNNNNNNZNDVHNNONNNONNNNNNRNNNRNNNNNNNNONNNNNNNNNNNNNNNUt/NNOCNNNNNRNNNBDQNNNNNNNNNNNNNNNNNNNNNNNNNTNNNNjNNNOpCjNNUNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNVNNNPNNNNNNNNNNNNNNNPPNNNRtNNNNNNNNNNNNNNP50MKu0NNNN0O8NNNNtNNNNVNNNNNVNNNNNNNNNNNNNNNNNNPNNNTNhpaAlLjNNNBDQNNNNDNNNNNDNNNNvNNNNNNNNNNNNNNNNNNONNNONYaWyoT9wNNNZNNNNNTNNNNNPNNNNWtNNNNNNNNNNNNNNNNNNDNNNDtNNNNNNNNNNNNNNNNNNNNPfCjNNNNNNNRtNNNNPNNHNhPHNNBjLNNNQNNNNNNNNNXD+NNP4NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNO4PXOLNNNbdWtNPXOpNNNbNXdMmTNNNPbNONNNRpkxNNNdNNtNNOUZnNNNXtNZNNNEmTjNNPbNRNNNRXuZjNDNDNNNNNDNNRDO+NDNNOT8pNNNXPvfNOvbGZNRNRNNNNNVNNORNstVNNNEiUDNNPtbeNNLdRmNONONNNNNQNNNENU4QNNNRok4NNNbXXjNTXuZjNDNDNNNNONNNRDO+ONNNOT8sNNNXPvfNOvbGZNVNCNNNNNHNNORNstHNNNDHXPNNNNbYOljuptRNNUQDODNNNvtuNNNXolVNNNcmVjNNPtjVtNHNNNDNNU4SNNNRPvfNOvbGZNRNPjNNNNLNNORNstLNNNDXXjNTXvVNNbNTNNNRXyMmQNNNOvtxNNNXqNLNNNXNOjNNOPbrNvtyNNNXXtNNRmNONNfNNNNUNNNENU4UNNNRPvfNOvbNRmNONNfNNNNUNNNENPtANNNTPvfNOvc+pwfNNUPNPNNNOUV7NNOjtNxNNNElBjNNpVNXNNNRXxbNNvtzNNNXNNZROFtENNNTNPbNNOZjONO0NNNNPNNNRDOmWjNNPtbTVYvPNDNtXWbONT8bNNNXXPxNNNbNNvtINNNTOPtHNNNTPjpbRjNNOtZbSDNNOvtFNNNTQNtbXtNNPt0WolfNNNbqzuZRRDEiYNNNPuhnRjHEOKV9NNOjTOvAStNNNFtgNNNXWuLbYtNNPtNdRmNSNWpNNNNWNNNENPtiNNNXN28jNNNXPjVPwzxK2cRspTRZNb5cS9LK2usJwF8NNNRANb5cS9bGOORRRjHJRjLeBtxEOtVEOcRVLDpEO5SugWjEOjAiZDNNPusn/tRGPORVRjxEPFjTSuZUNPfVNORUS9LGOjNEOusJRjLEOuRSZpNWNb5cTAbK1usnS9nAYjNNNFtlNNNXqNHNNOfXXjNTXtNGZNHNctNNNNbNNORNStfPomZNNNbGOkVUXQDNNNbZPNwLTgtAPEsnS9nAYjNNNEZRPOsnRjtJRjxeDjtK2uZXSuZYXl0PRDxEP281NNNXRjjFQPt2NNNXXQpNNNbJRDDUTvt4NNNXNNpn1tfEPksJRjfEPkRXZp0EPEsJRjxEPERVZopEOOLbBDNNPuZSRDHK2usJwF8NNNRGOuRRTuRTSuRTwzxbBNNNPtNEOtbeNNLdNNNGZNVNXNNNNNfNNORNN3WYNNOjXQbNNNbbBjNNPaZwNNNXPjpPomjNNNc0VtNNNDbeNNLdRmNRNRbNNNNZNNNENNWiZDNNPuuopm0NNNbYNz8kNNNXTAbZSt0eUjpPPEuiCtNNPu8DXQ8NNNbbDNNNPz9ONNNXWtxL1t0WPQUqO29PNNNXPvfNOvbNNOZjNDNUNNNNQDNNRDNHPvfNOvcTNNVJztVKztVLzvtENNNTNPbNNNNGZNZNVNNNNN4NNORNsttNNNE+PDNNOU4XNNNRXORNNNLNpwfNNUNXXjNTXuZjNtNFNNNNQjNNRDNPNluQNNNXXRDNNNbXXjNTXtNNRmNONNjNNNNDNNNENNVbEDNNPtbeNNLdRmNONONNNNNENNNENANWNNNPXPRNNNbXXjNTXuZjNDNZNNNNQtNNRDNPXRLNNNbXXjNTXuZjNtNqNNNNRtNNRDNPwNLNNOfH/tRYOljVXNRNNPfXXjHNNtbeNNLdWtNQ/uHTNNNoXvLNNvtzNNNXNPbNNNNGZNVNADNNNOZNNORNNagVNNNXo0xNNNbYO4jWNNNoSC4OQNtfSPtPNNNePjW7FNNNPtqiFtNNPtNNNNpXXjNTXyVNNvtzNNNXNNWmFjNNPa1VNNNXXv4bTNNNObNZNNNRXu4PXPLNNNbdNNOPH0cPNDNONNNNNNNZNNNNqwVhZP41ZQplAjNNNNNSNTjNNNPbPDNNV34NNODXNNOjPDNNV1A0pzyhM3ZNNNNNuOZNNTDNNNNwIIZN6OZNNONNNNNwE1IWENNNNCtGNNQ0ONNNV0Wfo2VNNNNNNNNNNtNNNIpIbtxWQjNNNCbOZjNJNNNONNNNBDNNNNfNNNNZNNNNVjNNNORNNNOYNNNNCjNNNOZNNNNTNNNNPtNNNNjNNNNWNNNNNDNNNNDNNNNONNNNNjNNNNZNNNNPNNNNNNNZODRNNNNNNNLNdtBJOjLNSjFJOjLNztYZOt8NQttNNNLN2jXzODLNwDBzODLN/tBzODLNltBzODLN4jBzODL
                    Source: 1.0.DHLHAWB 57462839.exe.3c0000.0.unpack, frmSplashScreen.csBase64 encoded string: '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
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/5@2/2
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile created: C:\Users\user\AppData\Roaming\AFpQKAcEJx.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeMutant created: \Sessions\1\BaseNamedObjects\GHkRelkHman
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5840:120:WilError_01
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB573.tmpJump to behavior
                    Source: DHLHAWB 57462839.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                    Source: DHLHAWB 57462839.exeVirustotal: Detection: 15%
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile read: C:\Users\user\Desktop\DHLHAWB 57462839.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\DHLHAWB 57462839.exe 'C:\Users\user\Desktop\DHLHAWB 57462839.exe'
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp'
                    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp'Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: DHLHAWB 57462839.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DHLHAWB 57462839.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC0E9 pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC04C pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC1BD pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC185 pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EB030C push 8BFFFFFFh; retf 5_2_00EB0318
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC44A push esi; ret 5_2_00EBC44D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC442 pushfd ; ret 5_2_00EBC445
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBC446 pushfd ; ret 5_2_00EBC449
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBBFE2 pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBBFA7 pushfd ; ret 5_2_00EBC415
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00EBBF00 pushfd ; ret 5_2_00EBC415
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.05918613534
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.05918613534
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile created: C:\Users\user\AppData\Roaming\AFpQKAcEJx.exeJump to dropped file

                    Boot Survival:

                    barindex
                    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion:

                    barindex
                    Yara detected AntiVM_3Show sources
                    Source: Yara matchFile source: 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.203348595.00000000028BD000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHLHAWB 57462839.exe PID: 3864, type: MEMORY
                    Source: Yara matchFile source: 1.2.DHLHAWB 57462839.exe.2870558.1.raw.unpack, type: UNPACKEDPE
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2308Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7508Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exe TID: 4196Thread sleep time: -99518s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exe TID: 4792Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: RegSvcs.exe, 00000005.00000002.469544421.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 00000005.00000002.469544421.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                    Source: RegSvcs.exe, 00000005.00000002.469425300.0000000005BDE000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WF_q
                    Source: RegSvcs.exe, 00000005.00000002.469544421.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                    Source: DHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: RegSvcs.exe, 00000005.00000002.469544421.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00E20A70 KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,5_2_00E20A70
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion:

                    barindex
                    Sample uses process hollowing techniqueShow sources
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base address: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp'Jump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: RegSvcs.exe, 00000005.00000002.463763849.00000000013F0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                    Source: RegSvcs.exe, 00000005.00000002.463763849.00000000013F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                    Source: RegSvcs.exe, 00000005.00000002.463763849.00000000013F0000.00000002.00000001.sdmpBinary or memory string: Progman
                    Source: RegSvcs.exe, 00000005.00000002.463763849.00000000013F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Users\user\Desktop\DHLHAWB 57462839.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHLHAWB 57462839.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHLHAWB 57462839.exe PID: 3864, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5300, type: MEMORY
                    Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHLHAWB 57462839.exe.3b02ff0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHLHAWB 57462839.exe.3b02ff0.4.raw.unpack, type: UNPACKEDPE
                    Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Tries to harvest and steal browser information (history, passwords, etc)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Tries to harvest and steal ftp login credentialsShow sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Tries to steal Mail credentials (via file access)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5300, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHLHAWB 57462839.exe PID: 3864, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5300, type: MEMORY
                    Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHLHAWB 57462839.exe.3b02ff0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.DHLHAWB 57462839.exe.3b02ff0.4.raw.unpack, type: UNPACKEDPE

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsShared Modules1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Input Capture21System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information21Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing2NTDSSecurity Software Discovery321Distributed Component Object ModelInput Capture21Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion14SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 358351 Sample: DHLHAWB 57462839.exe Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Multi AV Scanner detection for dropped file 2->35 37 Sigma detected: Scheduled temp file as task from temp location 2->37 39 9 other signatures 2->39 7 DHLHAWB 57462839.exe 7 2->7         started        process3 file4 21 C:\Users\user\AppData\...\AFpQKAcEJx.exe, PE32 7->21 dropped 23 C:\Users\...\AFpQKAcEJx.exe:Zone.Identifier, ASCII 7->23 dropped 25 C:\Users\user\AppData\Local\...\tmpB573.tmp, XML 7->25 dropped 27 C:\Users\user\...\DHLHAWB 57462839.exe.log, ASCII 7->27 dropped 41 Sample uses process hollowing technique 7->41 11 RegSvcs.exe 6 7->11         started        15 RegSvcs.exe 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 29 208.91.199.223, 49741, 587 PUBLIC-DOMAIN-REGISTRYUS United States 11->29 31 us2.smtp.mailhostbox.com 208.91.199.225, 49740, 587 PUBLIC-DOMAIN-REGISTRYUS United States 11->31 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->43 45 Tries to steal Mail credentials (via file access) 11->45 47 Tries to harvest and steal ftp login credentials 11->47 55 2 other signatures 11->55 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->51 53 Contains functionality to register a low level keyboard hook 15->53 19 conhost.exe 17->19         started        signatures8 process9

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    DHLHAWB 57462839.exe16%VirustotalBrowse
                    DHLHAWB 57462839.exe9%ReversingLabsByteCode-MSIL.Trojan.Wacatac
                    DHLHAWB 57462839.exe100%Joe Sandbox ML

                    Dropped Files

                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\AFpQKAcEJx.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\AFpQKAcEJx.exe16%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\AFpQKAcEJx.exe9%ReversingLabsByteCode-MSIL.Trojan.Wacatac

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    5.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                    Domains

                    No Antivirus matches

                    URLs

                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://AxCUzQTJay5lS.org0%Avira URL Cloudsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://LAQlpY.com2%VirustotalBrowse
                    http://LAQlpY.com0%Avira URL Cloudsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.199.225
                    truefalse
                      high

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSRegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://sectigo.com/CPS0RegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://us2.smtp.mailhostbox.comRegSvcs.exe, 00000005.00000002.465664877.0000000002D52000.00000004.00000001.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://AxCUzQTJay5lS.orgRegSvcs.exe, 00000005.00000002.465602038.0000000002D48000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.465439616.0000000002D1A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.sectigo.com0ARegSvcs.exe, 00000005.00000002.469506028.0000000005C77000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpfalse
                          high
                          https://api.ipify.org%RegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipDHLHAWB 57462839.exe, 00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssDHLHAWB 57462839.exe, 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmpfalse
                            high
                            http://LAQlpY.comRegSvcs.exe, 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmpfalse
                            • 2%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            208.91.199.225
                            unknownUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                            208.91.199.223
                            unknownUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUSfalse

                            General Information

                            Joe Sandbox Version:31.0.0 Emerald
                            Analysis ID:358351
                            Start date:25.02.2021
                            Start time:13:49:14
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 7m 28s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:DHLHAWB 57462839.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:26
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@8/5@2/2
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 0.1% (good quality ratio 0.1%)
                            • Quality average: 88.3%
                            • Quality standard deviation: 9.8%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 74
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                            • Excluded IPs from analysis (whitelisted): 13.88.21.125, 13.64.90.137, 104.43.139.144, 51.104.139.180, 2.21.140.114, 52.255.188.83, 20.54.26.129, 8.248.139.254, 8.253.207.121, 8.248.119.254, 67.26.73.254, 8.248.147.254, 92.122.213.194, 92.122.213.247, 168.61.161.212
                            • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            13:49:59API Interceptor1x Sleep call for process: DHLHAWB 57462839.exe modified
                            13:50:13API Interceptor745x Sleep call for process: RegSvcs.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            208.91.199.225MT SC GUANGZHOU.exeGet hashmaliciousBrowse
                              MT WOOJIN CHEMS V.2103.exeGet hashmaliciousBrowse
                                AOBO MOULD QUOTATION -1752002.exeGet hashmaliciousBrowse
                                  SecuriteInfo.com.Trojan.Packed2.42850.3598.exeGet hashmaliciousBrowse
                                    7Lf8J7h7os.exeGet hashmaliciousBrowse
                                      YKRAB010B_KHE_Preminary Packing List.xlsx.exeGet hashmaliciousBrowse
                                        SecuriteInfo.com.Artemis1A08A3826D57.exeGet hashmaliciousBrowse
                                          ELASTA-PL-INV-2021024.exeGet hashmaliciousBrowse
                                            SWIFT COPY $27,078.exeGet hashmaliciousBrowse
                                              SOA_021620244.exeGet hashmaliciousBrowse
                                                Maskman9.exeGet hashmaliciousBrowse
                                                  Purchase Order POPR73861911418 6241473 101838_pdf.exeGet hashmaliciousBrowse
                                                    EKSPTRUpD8.exeGet hashmaliciousBrowse
                                                      DHL RECEIPT.exeGet hashmaliciousBrowse
                                                        Consolidated Order #01846.docGet hashmaliciousBrowse
                                                          chrome.exeGet hashmaliciousBrowse
                                                            Order Confirmation.exeGet hashmaliciousBrowse
                                                              Swift-Copy.exeGet hashmaliciousBrowse
                                                                AirWaybill docs-CL.exeGet hashmaliciousBrowse
                                                                  d0KXi1s2I6.exeGet hashmaliciousBrowse
                                                                    208.91.199.223HcHimkU72e.exeGet hashmaliciousBrowse
                                                                      AOBO MOULD QUOTATION -1752002.exeGet hashmaliciousBrowse
                                                                        LIQUIDACION INTERBANCARIA 02_22_2021.xlsGet hashmaliciousBrowse
                                                                          ffkjg5CVrO.exeGet hashmaliciousBrowse
                                                                            7Lf8J7h7os.exeGet hashmaliciousBrowse
                                                                              AWB & Shipping Doc.exeGet hashmaliciousBrowse
                                                                                AWB & Shipping Doc.exeGet hashmaliciousBrowse
                                                                                  PAYMENT INVOICE-9876543456789.exeGet hashmaliciousBrowse
                                                                                    PO 000102.xlsxGet hashmaliciousBrowse
                                                                                      SOA.exeGet hashmaliciousBrowse
                                                                                        SWIFTMENSAJE09048.exeGet hashmaliciousBrowse
                                                                                          4OO9PbFQ3L.exeGet hashmaliciousBrowse
                                                                                            IBDvluSj0F.exeGet hashmaliciousBrowse
                                                                                              Purchase Order POPR73861911418 6241473 101838_pdf.exeGet hashmaliciousBrowse
                                                                                                pzpdxoUhJh.exeGet hashmaliciousBrowse
                                                                                                  Factura.exeGet hashmaliciousBrowse
                                                                                                    Swift-Copy.exeGet hashmaliciousBrowse
                                                                                                      9S4cmTrqO3.exeGet hashmaliciousBrowse
                                                                                                        Purchase Order POPR73861911418 6241473 101838_pdf.exeGet hashmaliciousBrowse
                                                                                                          Invoice-Copy.exeGet hashmaliciousBrowse

                                                                                                            Domains

                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                            us2.smtp.mailhostbox.com4019223246.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            Swift.jpg.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            INVOICE-2101-0006N.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            1344-21-03-00079 Q N QUEUE.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            MT SC GUANGZHOU.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            HcHimkU72e.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            MT WOOJIN CHEMS V.2103.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            AWB & Shipping Document.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            AOBO MOULD QUOTATION -1752002.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            JKG Eximcon Pvt. Ltd P.O.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            SecuriteInfo.com.Mal.Generic-S.15142.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            LIQUIDACION INTERBANCARIA 02_22_2021.xlsGet hashmaliciousBrowse
                                                                                                            • 208.91.199.223
                                                                                                            SecuriteInfo.com.Trojan.Packed2.42850.3598.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            SecuriteInfo.com.Trojan.Inject4.6572.1879.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            SWIFT Payment W0301.docGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            ffkjg5CVrO.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            7Lf8J7h7os.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.223
                                                                                                            Shipping Details_PDF.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143

                                                                                                            ASN

                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                            PUBLIC-DOMAIN-REGISTRYUS4019223246.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            data.xlsGet hashmaliciousBrowse
                                                                                                            • 5.100.152.162
                                                                                                            Swift.jpg.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            Claim-920537744-02082021.xlsGet hashmaliciousBrowse
                                                                                                            • 119.18.58.55
                                                                                                            Claim-920537744-02082021.xlsGet hashmaliciousBrowse
                                                                                                            • 119.18.58.55
                                                                                                            INVOICE-2101-0006N.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            logs.php.dllGet hashmaliciousBrowse
                                                                                                            • 116.206.105.72
                                                                                                            1344-21-03-00079 Q N QUEUE.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            MT SC GUANGZHOU.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            HcHimkU72e.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            MT WOOJIN CHEMS V.2103.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            AWB & Shipping Document.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            Document14371.xlsGet hashmaliciousBrowse
                                                                                                            • 103.50.162.157
                                                                                                            Document14371.xlsGet hashmaliciousBrowse
                                                                                                            • 103.50.162.157
                                                                                                            AOBO MOULD QUOTATION -1752002.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.223
                                                                                                            JKG Eximcon Pvt. Ltd P.O.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            SecuriteInfo.com.Mal.Generic-S.15142.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            smartandfinalTicket#51347303511505986.htmGet hashmaliciousBrowse
                                                                                                            • 208.91.198.178
                                                                                                            f4b1bde3-706a-40d2-8ace-693803810b6f.exeGet hashmaliciousBrowse
                                                                                                            • 103.53.43.36
                                                                                                            PUBLIC-DOMAIN-REGISTRYUS4019223246.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            data.xlsGet hashmaliciousBrowse
                                                                                                            • 5.100.152.162
                                                                                                            Swift.jpg.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            Claim-920537744-02082021.xlsGet hashmaliciousBrowse
                                                                                                            • 119.18.58.55
                                                                                                            Claim-920537744-02082021.xlsGet hashmaliciousBrowse
                                                                                                            • 119.18.58.55
                                                                                                            INVOICE-2101-0006N.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            logs.php.dllGet hashmaliciousBrowse
                                                                                                            • 116.206.105.72
                                                                                                            1344-21-03-00079 Q N QUEUE.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            MT SC GUANGZHOU.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            HcHimkU72e.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            MT WOOJIN CHEMS V.2103.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.225
                                                                                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            AWB & Shipping Document.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.224
                                                                                                            Document14371.xlsGet hashmaliciousBrowse
                                                                                                            • 103.50.162.157
                                                                                                            Document14371.xlsGet hashmaliciousBrowse
                                                                                                            • 103.50.162.157
                                                                                                            AOBO MOULD QUOTATION -1752002.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.199.223
                                                                                                            JKG Eximcon Pvt. Ltd P.O.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            SecuriteInfo.com.Mal.Generic-S.15142.exeGet hashmaliciousBrowse
                                                                                                            • 208.91.198.143
                                                                                                            smartandfinalTicket#51347303511505986.htmGet hashmaliciousBrowse
                                                                                                            • 208.91.198.178
                                                                                                            f4b1bde3-706a-40d2-8ace-693803810b6f.exeGet hashmaliciousBrowse
                                                                                                            • 103.53.43.36

                                                                                                            JA3 Fingerprints

                                                                                                            No context

                                                                                                            Dropped Files

                                                                                                            No context

                                                                                                            Created / dropped Files

                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHLHAWB 57462839.exe.log
                                                                                                            Process:C:\Users\user\Desktop\DHLHAWB 57462839.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):1314
                                                                                                            Entropy (8bit):5.350128552078965
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                                                            MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                                                            SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                                                            SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                                                            SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                                                            Malicious:true
                                                                                                            Reputation:high, very likely benign file
                                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                                            C:\Users\user\AppData\Local\Temp\tmpB573.tmp
                                                                                                            Process:C:\Users\user\Desktop\DHLHAWB 57462839.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1643
                                                                                                            Entropy (8bit):5.197538682468153
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB0YBtn:cbh47TlNQ//rydbz9I3YODOLNdq3eYT
                                                                                                            MD5:6A56190E635BC231A74FC166E5683F68
                                                                                                            SHA1:40516319C127B183D9BDDB8799ECDC5C9E650652
                                                                                                            SHA-256:4C08AD360B206E83373C5610889C07EE8CCE02B95923563D5A6A868035DC3160
                                                                                                            SHA-512:15C2BDFAD6C3496F355A542FEF6A091F5402E76DF80DFF449896F6E96D0392C38385E7A4FE2C190E685E2EC57D308727EE07311411B7BC16C9654246E8F9CBA7
                                                                                                            Malicious:true
                                                                                                            Reputation:low
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                                            C:\Users\user\AppData\Roaming\5qvjakll.zyj\Chrome\Default\Cookies
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                                            Category:dropped
                                                                                                            Size (bytes):20480
                                                                                                            Entropy (8bit):0.6970840431455908
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                                                                            MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                                                                            SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                                                                            SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                                                                            SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                            C:\Users\user\AppData\Roaming\AFpQKAcEJx.exe
                                                                                                            Process:C:\Users\user\Desktop\DHLHAWB 57462839.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):787456
                                                                                                            Entropy (8bit):7.047825955554763
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:Si0hNfUjwdtaxyevwwVVi/goXD1v0Wwst01Jv/adetPJEwKY:SBhNf2xuwVVXGBMLsCTydkJP1
                                                                                                            MD5:83A8EAA2EF938A73DAACEBCD4E090843
                                                                                                            SHA1:817203C16A790450A754DC16CF59111DD2DADAA7
                                                                                                            SHA-256:5A0B3456792F8D0E1DB3FA224863CCAB694349F33CDE1130BCF4436563EE0B2A
                                                                                                            SHA-512:9CA05929A37455D6C8CCC6A8BB8345929FF8F50F60CAB3318B560E5CF11A1E91DAC09487738C0CDE24CD36BB86936E3932371C7B35B75F186257195DF2B3240E
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                            • Antivirus: Virustotal, Detection: 16%, Browse
                                                                                                            • Antivirus: ReversingLabs, Detection: 9%
                                                                                                            Reputation:low
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e7`..............P......T........... ........@.. .......................`............@.................................0...O........Q...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc....Q.......R..................@..@.reloc.......@......................@..B................d.......H..........tO..........X................................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....oL...(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                                                                            C:\Users\user\AppData\Roaming\AFpQKAcEJx.exe:Zone.Identifier
                                                                                                            Process:C:\Users\user\Desktop\DHLHAWB 57462839.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):26
                                                                                                            Entropy (8bit):3.95006375643621
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:ggPYV:rPYV
                                                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                            Malicious:true
                                                                                                            Reputation:high, very likely benign file
                                                                                                            Preview: [ZoneTransfer]....ZoneId=0

                                                                                                            Static File Info

                                                                                                            General

                                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Entropy (8bit):7.047825955554763
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                            File name:DHLHAWB 57462839.exe
                                                                                                            File size:787456
                                                                                                            MD5:83a8eaa2ef938a73daacebcd4e090843
                                                                                                            SHA1:817203c16a790450a754dc16cf59111dd2dadaa7
                                                                                                            SHA256:5a0b3456792f8d0e1db3fa224863ccab694349f33cde1130bcf4436563ee0b2a
                                                                                                            SHA512:9ca05929a37455d6c8ccc6a8bb8345929ff8f50f60cab3318b560e5cf11a1e91dac09487738c0cde24cd36bb86936e3932371c7b35b75f186257195df2b3240e
                                                                                                            SSDEEP:12288:Si0hNfUjwdtaxyevwwVVi/goXD1v0Wwst01Jv/adetPJEwKY:SBhNf2xuwVVXGBMLsCTydkJP1
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e7`..............P......T........... ........@.. .......................`............@................................

                                                                                                            File Icon

                                                                                                            Icon Hash:e0dad4adc4d2d870

                                                                                                            Static PE Info

                                                                                                            General

                                                                                                            Entrypoint:0x4bcc82
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                            Time Stamp:0x603765F8 [Thu Feb 25 08:55:20 2021 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:v4.0.30319
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                            Entrypoint Preview

                                                                                                            Instruction
                                                                                                            jmp dword ptr [00402000h]
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al

                                                                                                            Data Directories

                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbcc300x4f.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x51c8.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                            Sections

                                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x20000xbac880xbae00False0.607109636288data7.05918613534IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0xbe0000x51c80x5200False0.188929115854data4.23555059469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .reloc0xc40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                            Resources

                                                                                                            NameRVASizeTypeLanguageCountry
                                                                                                            RT_ICON0xbe1000x4228dBase III DBT, version number 0, next free block index 40
                                                                                                            RT_GROUP_ICON0xc23380x14data
                                                                                                            RT_VERSION0xc235c0x340data
                                                                                                            RT_MANIFEST0xc26ac0xb15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                                                                                            Imports

                                                                                                            DLLImport
                                                                                                            mscoree.dll_CorExeMain

                                                                                                            Version Infos

                                                                                                            DescriptionData
                                                                                                            Translation0x0000 0x04b0
                                                                                                            LegalCopyrightCopyright 2014
                                                                                                            Assembly Version3.0.0.0
                                                                                                            InternalNameAssemblyName.exe
                                                                                                            FileVersion3.0.0.0
                                                                                                            CompanyNameKTV
                                                                                                            LegalTrademarks
                                                                                                            Comments
                                                                                                            ProductNameKTVManagement
                                                                                                            ProductVersion3.0.0.0
                                                                                                            FileDescriptionKTVManagement
                                                                                                            OriginalFilenameAssemblyName.exe

                                                                                                            Network Behavior

                                                                                                            Network Port Distribution

                                                                                                            TCP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Feb 25, 2021 13:51:40.813127041 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:40.988892078 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:40.989254951 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:41.539948940 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:41.540853024 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:41.715833902 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:41.715883970 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:41.716192007 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:41.890968084 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:41.935988903 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:41.954796076 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:42.131486893 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.131551981 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.131591082 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.131617069 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.131655931 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.131678104 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:42.131767035 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:42.306412935 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.311794043 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:42.490824938 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:42.545490026 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:42.841698885 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.018898964 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:43.023649931 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.200114012 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:43.201809883 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.378850937 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:43.380067110 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.557027102 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:43.557990074 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.737915993 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:43.779933929 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:43.880987883 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:44.058396101 CET58749740208.91.199.225192.168.2.3
                                                                                                            Feb 25, 2021 13:51:44.058507919 CET49740587192.168.2.3208.91.199.225
                                                                                                            Feb 25, 2021 13:51:45.315519094 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:45.479309082 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:45.479845047 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.073095083 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.073640108 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.237596989 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.237647057 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.238172054 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.402223110 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.403289080 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.568038940 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.568103075 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.568142891 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.568170071 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.568207979 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.568330050 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.568362951 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.734354019 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.735764027 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:46.906882048 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:46.909528971 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.075299978 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.076175928 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.241281986 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.242660999 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.411184072 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.412117958 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.578273058 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.579174995 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.749783039 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.750633001 CET49741587192.168.2.3208.91.199.223
                                                                                                            Feb 25, 2021 13:51:47.915018082 CET58749741208.91.199.223192.168.2.3
                                                                                                            Feb 25, 2021 13:51:47.915121078 CET49741587192.168.2.3208.91.199.223

                                                                                                            UDP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Feb 25, 2021 13:49:53.920747995 CET4919953192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:49:53.971043110 CET53491998.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:49:58.832365036 CET5062053192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:49:58.883986950 CET53506208.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:00.941257000 CET6493853192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:00.990159988 CET53649388.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:02.136508942 CET6015253192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:02.188143969 CET53601528.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:03.338567019 CET5754453192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:03.387590885 CET53575448.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:25.557085991 CET5598453192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:25.607717037 CET53559848.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:32.008502007 CET6418553192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:32.067214966 CET53641858.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:35.734534025 CET6511053192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:35.787048101 CET53651108.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:36.843938112 CET5836153192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:36.894598007 CET53583618.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:37.662094116 CET6349253192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:37.710988998 CET53634928.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:40.487922907 CET6083153192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:40.548060894 CET53608318.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:41.072861910 CET6010053192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:41.138422012 CET53601008.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:50:47.607956886 CET5319553192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:50:47.658315897 CET53531958.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:01.297982931 CET5014153192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:01.349564075 CET53501418.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:04.098345995 CET5302353192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:04.157299042 CET53530238.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:11.739728928 CET4956353192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:11.790262938 CET53495638.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:13.349217892 CET5135253192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:13.400985956 CET53513528.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:14.318475962 CET5934953192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:14.370239973 CET53593498.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:15.300899029 CET5708453192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:15.349714041 CET53570848.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:18.769519091 CET5882353192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:18.818229914 CET53588238.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:19.959436893 CET5756853192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:20.011292934 CET53575688.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:20.970906019 CET5054053192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:21.019840956 CET53505408.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:21.952682972 CET5436653192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:22.004359961 CET53543668.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:23.630259037 CET5303453192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:23.679390907 CET53530348.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:24.641812086 CET5776253192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:24.690752029 CET53577628.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:36.162192106 CET5543553192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:36.213768959 CET53554358.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:38.252203941 CET5071353192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:38.320322990 CET53507138.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:40.602556944 CET5613253192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:40.663743973 CET53561328.8.8.8192.168.2.3
                                                                                                            Feb 25, 2021 13:51:45.252988100 CET5898753192.168.2.38.8.8.8
                                                                                                            Feb 25, 2021 13:51:45.313564062 CET53589878.8.8.8192.168.2.3

                                                                                                            DNS Queries

                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                            Feb 25, 2021 13:51:40.602556944 CET192.168.2.38.8.8.80x64dStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:45.252988100 CET192.168.2.38.8.8.80xba6fStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)

                                                                                                            DNS Answers

                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                            Feb 25, 2021 13:51:40.663743973 CET8.8.8.8192.168.2.30x64dNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:40.663743973 CET8.8.8.8192.168.2.30x64dNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:40.663743973 CET8.8.8.8192.168.2.30x64dNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:40.663743973 CET8.8.8.8192.168.2.30x64dNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:45.313564062 CET8.8.8.8192.168.2.30xba6fNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:45.313564062 CET8.8.8.8192.168.2.30xba6fNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:45.313564062 CET8.8.8.8192.168.2.30xba6fNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                                                            Feb 25, 2021 13:51:45.313564062 CET8.8.8.8192.168.2.30xba6fNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)

                                                                                                            SMTP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                            Feb 25, 2021 13:51:41.539948940 CET58749740208.91.199.225192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                                                            Feb 25, 2021 13:51:41.540853024 CET49740587192.168.2.3208.91.199.225EHLO 258555
                                                                                                            Feb 25, 2021 13:51:41.715883970 CET58749740208.91.199.225192.168.2.3250-us2.outbound.mailhostbox.com
                                                                                                            250-PIPELINING
                                                                                                            250-SIZE 41648128
                                                                                                            250-VRFY
                                                                                                            250-ETRN
                                                                                                            250-STARTTLS
                                                                                                            250-AUTH PLAIN LOGIN
                                                                                                            250-AUTH=PLAIN LOGIN
                                                                                                            250-ENHANCEDSTATUSCODES
                                                                                                            250-8BITMIME
                                                                                                            250 DSN
                                                                                                            Feb 25, 2021 13:51:41.716192007 CET49740587192.168.2.3208.91.199.225STARTTLS
                                                                                                            Feb 25, 2021 13:51:41.890968084 CET58749740208.91.199.225192.168.2.3220 2.0.0 Ready to start TLS
                                                                                                            Feb 25, 2021 13:51:46.073095083 CET58749741208.91.199.223192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                                                            Feb 25, 2021 13:51:46.073640108 CET49741587192.168.2.3208.91.199.223EHLO 258555
                                                                                                            Feb 25, 2021 13:51:46.237647057 CET58749741208.91.199.223192.168.2.3250-us2.outbound.mailhostbox.com
                                                                                                            250-PIPELINING
                                                                                                            250-SIZE 41648128
                                                                                                            250-VRFY
                                                                                                            250-ETRN
                                                                                                            250-STARTTLS
                                                                                                            250-AUTH PLAIN LOGIN
                                                                                                            250-AUTH=PLAIN LOGIN
                                                                                                            250-ENHANCEDSTATUSCODES
                                                                                                            250-8BITMIME
                                                                                                            250 DSN
                                                                                                            Feb 25, 2021 13:51:46.238172054 CET49741587192.168.2.3208.91.199.223STARTTLS
                                                                                                            Feb 25, 2021 13:51:46.402223110 CET58749741208.91.199.223192.168.2.3220 2.0.0 Ready to start TLS

                                                                                                            Code Manipulations

                                                                                                            Statistics

                                                                                                            CPU Usage

                                                                                                            Click to jump to process

                                                                                                            Memory Usage

                                                                                                            Click to jump to process

                                                                                                            High Level Behavior Distribution

                                                                                                            Click to dive into process behavior distribution

                                                                                                            Behavior

                                                                                                            Click to jump to process

                                                                                                            System Behavior

                                                                                                            General

                                                                                                            Start time:13:49:58
                                                                                                            Start date:25/02/2021
                                                                                                            Path:C:\Users\user\Desktop\DHLHAWB 57462839.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Users\user\Desktop\DHLHAWB 57462839.exe'
                                                                                                            Imagebase:0x3c0000
                                                                                                            File size:787456 bytes
                                                                                                            MD5 hash:83A8EAA2EF938A73DAACEBCD4E090843
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.203262419.0000000002841000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.203348595.00000000028BD000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.204175053.0000000003AB0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            Reputation:low

                                                                                                            General

                                                                                                            Start time:13:50:00
                                                                                                            Start date:25/02/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AFpQKAcEJx' /XML 'C:\Users\user\AppData\Local\Temp\tmpB573.tmp'
                                                                                                            Imagebase:0xc00000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:13:50:01
                                                                                                            Start date:25/02/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6b2800000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:13:50:01
                                                                                                            Start date:25/02/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                            Imagebase:0x400000
                                                                                                            File size:45152 bytes
                                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:13:50:01
                                                                                                            Start date:25/02/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                            Imagebase:0x740000
                                                                                                            File size:45152 bytes
                                                                                                            MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.461216400.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.464641605.0000000002A91000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            Reputation:moderate

                                                                                                            Disassembly

                                                                                                            Code Analysis

                                                                                                            Reset < >

                                                                                                              Executed Functions

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b7db036a709f096b223e6091e5f1f99c9288b85d7552430a954bd9af52cff251
                                                                                                              • Instruction ID: c7cefb24083f62d3a9c847c6a0432bb58682f6573d3061c871f1233a216b8011
                                                                                                              • Opcode Fuzzy Hash: b7db036a709f096b223e6091e5f1f99c9288b85d7552430a954bd9af52cff251
                                                                                                              • Instruction Fuzzy Hash: CB526A31A00619CFDB14DF64C880BAAB7B6FF45304F5589A9E91AAB391D770FD85CB80
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 02686C10
                                                                                                              • GetCurrentThread.KERNEL32 ref: 02686C4D
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 02686C8A
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 02686CE3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: 35c2ec6ee102dab598f3676b29cc40e657a6fc8a9449a08d9da1437b03ce59e7
                                                                                                              • Instruction ID: b9c9e33069d0d605e6a4d5f858aae71594a51db1199ccd78ec33edd218e2b85c
                                                                                                              • Opcode Fuzzy Hash: 35c2ec6ee102dab598f3676b29cc40e657a6fc8a9449a08d9da1437b03ce59e7
                                                                                                              • Instruction Fuzzy Hash: 035165B4A00749CFDB00CFAAD688B9EBBF4EF49308F148599E119A7390D774A944CB65
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 02686C10
                                                                                                              • GetCurrentThread.KERNEL32 ref: 02686C4D
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 02686C8A
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 02686CE3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: cb1d73de1e48aff65da611dbf3cf65f36431376d4b2e1336160d22571e06df2e
                                                                                                              • Instruction ID: 8c41c3b997efa1100c32765af8185909792584a232d24d6f2957b00a924d2ff9
                                                                                                              • Opcode Fuzzy Hash: cb1d73de1e48aff65da611dbf3cf65f36431376d4b2e1336160d22571e06df2e
                                                                                                              • Instruction Fuzzy Hash: 675154B4A00649CFDB10CFAAD688B9EBBF4FF48308F208559E119A7390D774A944CF65
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0268DD8A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: a11cd926cbbc74b0c61e2e6d8781e242f391eea14313a48b28fe864b9f1f7155
                                                                                                              • Instruction ID: 1aefc7f8ce32b55826c7917ddb5a4d6b0441bb5258e03df6064677ab61a4ff3a
                                                                                                              • Opcode Fuzzy Hash: a11cd926cbbc74b0c61e2e6d8781e242f391eea14313a48b28fe864b9f1f7155
                                                                                                              • Instruction Fuzzy Hash: 4C9170B1C09389DFCB12CFA4C854ACDBFB1AF1A314F15829BE454AB2A2D7349949CF51
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0268BE06
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 30d77a4ad7bd3527bf68cb02323ff0d4bb5df4d50ce1f1e6c072aac45bea66fb
                                                                                                              • Instruction ID: 0ff00836a8ec1257cf2af57088b8c94a646ce650fe79ecc166f754cb31ee48fa
                                                                                                              • Opcode Fuzzy Hash: 30d77a4ad7bd3527bf68cb02323ff0d4bb5df4d50ce1f1e6c072aac45bea66fb
                                                                                                              • Instruction Fuzzy Hash: F4813570A00B058FD724EF6AC54575ABBF1BF48208F008A2ED586DBB40EB75E846CF91
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0268DD8A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: b0eb7f25a8a61181a75402bf1322f99006996619da2c2d9a7785885e3531d863
                                                                                                              • Instruction ID: 62a83724cb04537f291e246499f3b89b1a1fe4907d72c6db75685adc6af35ad6
                                                                                                              • Opcode Fuzzy Hash: b0eb7f25a8a61181a75402bf1322f99006996619da2c2d9a7785885e3531d863
                                                                                                              • Instruction Fuzzy Hash: AB41A3B1D00309DFDF14DFA9D984ADEBBB5BF48314F24822AE415AB250D774A945CF90
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02686E5F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: e0649cbf8b57242d73ac83c966fb9b694c54830e03d9c73dc5660545e05525e4
                                                                                                              • Instruction ID: b7f8f833720c1068c5630533c5262356393dd260afb37c42113f5354cd6e3a23
                                                                                                              • Opcode Fuzzy Hash: e0649cbf8b57242d73ac83c966fb9b694c54830e03d9c73dc5660545e05525e4
                                                                                                              • Instruction Fuzzy Hash: BA4177B6900248AFCB01CFA9D884ADEBFF9EF49324F04805AE954A7351D775A914CFA0
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02686E5F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 962c1bb511de83c2e4a9ee0c76c5315014aca4f589dcefc86117b7f4d0c54f34
                                                                                                              • Instruction ID: 0c127d6ad8b2294bebf68d5ef77d6c20e4a997f6c5a710f1fc52b1d0fa3aacbc
                                                                                                              • Opcode Fuzzy Hash: 962c1bb511de83c2e4a9ee0c76c5315014aca4f589dcefc86117b7f4d0c54f34
                                                                                                              • Instruction Fuzzy Hash: A621D5B5D002089FDB10CFAAD584ADEBBF8FB48324F14841AE955A7310D774A944CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02686E5F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 5ce7b2786b91b41492e47be22eddd7c00be40c84e42b33403074a28ea1aeb3ec
                                                                                                              • Instruction ID: 803df573871f3bb9bfe1b2fe3fe87bcee1ea1f1a744c22848894610b230a6cdf
                                                                                                              • Opcode Fuzzy Hash: 5ce7b2786b91b41492e47be22eddd7c00be40c84e42b33403074a28ea1aeb3ec
                                                                                                              • Instruction Fuzzy Hash: C62103B59013089FDB00CFA9D584AEEBBF8FF08324F14845AE954A7310D334A955CFA0
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0268BE81,00000800,00000000,00000000), ref: 0268C092
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID:
                                                                                                              • API String ID: 1029625771-0
                                                                                                              • Opcode ID: a31c2f0d519df0d7cdc06c3d754424c8e2b9ab4e60e832fbcf23f57337cfe200
                                                                                                              • Instruction ID: 711877361382ad3815dee18905417fef017db7f6227f3d778d6441f4cf811094
                                                                                                              • Opcode Fuzzy Hash: a31c2f0d519df0d7cdc06c3d754424c8e2b9ab4e60e832fbcf23f57337cfe200
                                                                                                              • Instruction Fuzzy Hash: B31144B29003488FCB14DF9AD444BDEFBF4EB88364F00852AE515A7700C376A945CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0268BE81,00000800,00000000,00000000), ref: 0268C092
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID:
                                                                                                              • API String ID: 1029625771-0
                                                                                                              • Opcode ID: ed57272f0638e5f8e5b7b6a5d79b2a5e122b870dbe28ff68bc0d8457fea3a66c
                                                                                                              • Instruction ID: a0716ae96f77b808c8372a901f72105f5cf457b234cf40328ecd56adc6b2af58
                                                                                                              • Opcode Fuzzy Hash: ed57272f0638e5f8e5b7b6a5d79b2a5e122b870dbe28ff68bc0d8457fea3a66c
                                                                                                              • Instruction Fuzzy Hash: 921114B6D003498FDB14CF9AD584BDEFBF4AF48364F10851AD515AB600C375A949CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0268BE06
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 28019a97d630fbde8aca37c3b6efa647061442718cac18be613d1eeda576f694
                                                                                                              • Instruction ID: b48ad060ed3280c936bc5831f42b0a7a04f77572e261727b162cacf6cfc11ba8
                                                                                                              • Opcode Fuzzy Hash: 28019a97d630fbde8aca37c3b6efa647061442718cac18be613d1eeda576f694
                                                                                                              • Instruction Fuzzy Hash: 1F110FB2D002098FCB10DF9AC548ADEFBF4AF88228F14851AD429A7300D378A546CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • SetWindowLongW.USER32(?,?,?), ref: 0268DF1D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LongWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 1378638983-0
                                                                                                              • Opcode ID: 1e187477de87276edf9a23a7951db619bbd00a361a5e2570571b9318c39d6edc
                                                                                                              • Instruction ID: ff87277f3f5f9d77fa1cf14fb261e01b4cdaa2e42de3c6264c71cd71f283b1dd
                                                                                                              • Opcode Fuzzy Hash: 1e187477de87276edf9a23a7951db619bbd00a361a5e2570571b9318c39d6edc
                                                                                                              • Instruction Fuzzy Hash: 4011E2B59003099FDB10DF9AD588BDEBBF8EB48324F10851AE955A7740C374A944CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • SetWindowLongW.USER32(?,?,?), ref: 0268DF1D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LongWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 1378638983-0
                                                                                                              • Opcode ID: 954c072d8da20efbe6f486f9297286c10534cb3c05aa5b74e4b2612d5113bcae
                                                                                                              • Instruction ID: 6154c20cec9eca8f9d1116cf17cba95cd858c7302d209ec27d10973259697925
                                                                                                              • Opcode Fuzzy Hash: 954c072d8da20efbe6f486f9297286c10534cb3c05aa5b74e4b2612d5113bcae
                                                                                                              • Instruction Fuzzy Hash: EA1112B5900309CFDB10DF99D584BDEBBF8EB88324F20851AD959A7740C774AA45CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Non-executed Functions

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 345b8c5b0654230ebfc9e01b65848a150ffaa7b4ccdbb7c174bb40e59ec4a538
                                                                                                              • Instruction ID: 0d27f99b3b9ea292e3229e9b7eaf121655e3df52b52981dcb0b259fe77aedf41
                                                                                                              • Opcode Fuzzy Hash: 345b8c5b0654230ebfc9e01b65848a150ffaa7b4ccdbb7c174bb40e59ec4a538
                                                                                                              • Instruction Fuzzy Hash: BD02B3F1E917468AD310CF65E89818C7BA1B745328BD06A09D2631FAD1D7B825EECF44
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000001.00000002.203075967.0000000002680000.00000040.00000001.sdmp, Offset: 02680000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 90d0625bb55d03c2ffb244f41666b060f8d3ae9755a21343e2dba674e53135e8
                                                                                                              • Instruction ID: 3a1f4856a4705898c8d960ab7a252e721768bb3020eebec16721cc5485d12a40
                                                                                                              • Opcode Fuzzy Hash: 90d0625bb55d03c2ffb244f41666b060f8d3ae9755a21343e2dba674e53135e8
                                                                                                              • Instruction Fuzzy Hash: D0A17C36E0021ACFCF15EFA5C8445DEBBB2FF85304B15866AE905BB221EB71A955CF40
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Executed Functions

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 5298f8961432adb4a647c4cc7561e25a7036c4b0fcadd56c4aeef6ef1d89f19a
                                                                                                              • Instruction ID: 19c87b08a272784caf044a7407916c712cbd7b30b2c67e1d45346e5be7010a0d
                                                                                                              • Opcode Fuzzy Hash: 5298f8961432adb4a647c4cc7561e25a7036c4b0fcadd56c4aeef6ef1d89f19a
                                                                                                              • Instruction Fuzzy Hash: BEA20574A01228CFCB64EB34D85869DB7B6BF89305F2085EAD50AA3344DF399E85CF51
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463234167.0000000000EB0000.00000040.00000001.sdmp, Offset: 00EB0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: :
                                                                                                              • API String ID: 0-3403754754
                                                                                                              • Opcode ID: 8a29664fe68e1ec900064dce7012316e06dddaff432320bc0dc317ad77f6ad02
                                                                                                              • Instruction ID: 6829f9c60dd5acb089d6ce5e15ca7d76fef678f5671452b6d56553f6f9c07782
                                                                                                              • Opcode Fuzzy Hash: 8a29664fe68e1ec900064dce7012316e06dddaff432320bc0dc317ad77f6ad02
                                                                                                              • Instruction Fuzzy Hash: 4202C335B002059FDB14EBB8C859BAEB7F2AF85304F148469E506EB395DF39DC058B51
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 00E92AE3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HookWindows
                                                                                                              • String ID:
                                                                                                              • API String ID: 2559412058-0
                                                                                                              • Opcode ID: 3fc27fd8a3dc85a1454b6863dffd0b6fca6d2fc418b5fea788c0b00bc5a0bb90
                                                                                                              • Instruction ID: 83a005daa6018ddadef00a09a979ad76f54e79a1a87598c12df8c7cdb2affa14
                                                                                                              • Opcode Fuzzy Hash: 3fc27fd8a3dc85a1454b6863dffd0b6fca6d2fc418b5fea788c0b00bc5a0bb90
                                                                                                              • Instruction Fuzzy Hash: E62107B59002099FCF54CF9AD844BEEBBF5EB88324F14841DE519A7350DBB4A944CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: a9eddcb31a9213198f405a9f426fd13f81825bd888a751bcb52b50b3ba662b45
                                                                                                              • Instruction ID: ba3f099713e1731c2532e3597c0307a5d4d0e8e6028e67dc57f5b356da6fc65d
                                                                                                              • Opcode Fuzzy Hash: a9eddcb31a9213198f405a9f426fd13f81825bd888a751bcb52b50b3ba662b45
                                                                                                              • Instruction Fuzzy Hash: FE6205B4A11228CFCB65DB34E85869DB7B6BF89305F2084EAD50AA3344CF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 5e665b11d164a018b06d8fea5c8fd28307b7b6305de01753ea81046923189015
                                                                                                              • Instruction ID: eb6a113d56d30c1249fe1b6dfe842d8c17bf2f74d0527425366eb5a16227562d
                                                                                                              • Opcode Fuzzy Hash: 5e665b11d164a018b06d8fea5c8fd28307b7b6305de01753ea81046923189015
                                                                                                              • Instruction Fuzzy Hash: FE52F5B4A01228CFCB65DB34E85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: b19778dd8940c8fa648cc6ba732cd41688bd081c5e19b119ec0901d16bf18f66
                                                                                                              • Instruction ID: b013f1dfe02fbca0bf7aedac3736aacb88bb6d475564a7fccc5f9db23608a992
                                                                                                              • Opcode Fuzzy Hash: b19778dd8940c8fa648cc6ba732cd41688bd081c5e19b119ec0901d16bf18f66
                                                                                                              • Instruction Fuzzy Hash: 3A5205B4A01228CFCB65DB34E85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 39528112b8b810e360756be33fb535bbad3ca7a5ac8ec9726b425be6aca14b9f
                                                                                                              • Instruction ID: 35f42804a00161a0dd70065d4e48b441d9c1f55743d71fafe59b6232cec2f0be
                                                                                                              • Opcode Fuzzy Hash: 39528112b8b810e360756be33fb535bbad3ca7a5ac8ec9726b425be6aca14b9f
                                                                                                              • Instruction Fuzzy Hash: CC5205B4A11228CFCB65DB24E85869DB7B6BF89305F2084EAD50AA3344CF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 10022ce09f89a44c92d9b64e731f214c70fe1505f8cb6b728ee38df21809b076
                                                                                                              • Instruction ID: 4dbaa14a7cfaa65f82728fb10f7038a90b9ac801d34d09f59081066d1bae715b
                                                                                                              • Opcode Fuzzy Hash: 10022ce09f89a44c92d9b64e731f214c70fe1505f8cb6b728ee38df21809b076
                                                                                                              • Instruction Fuzzy Hash: 4E5204B4A01228CFCB65DB34E85869DB7B6BF89305F2084EAD50AA3344CF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: f6801daf2a46cfec466e955d5ccf8763604bab05af2a33dd9f20cd6aa3437aa7
                                                                                                              • Instruction ID: b7d73d5cd42eeb1f6ebf9929fca02f78601db5244d0b9982c417a91c9499b324
                                                                                                              • Opcode Fuzzy Hash: f6801daf2a46cfec466e955d5ccf8763604bab05af2a33dd9f20cd6aa3437aa7
                                                                                                              • Instruction Fuzzy Hash: CB52F5B4A01228CFCB65DB34E85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: e132c0b867aa7eef5382ae29dc0c53c517d243434872ddc09848389ce50e4e3b
                                                                                                              • Instruction ID: b68fb77da355f2d31f5f0e8fad4f5738b71bce1b171587697088549a820b3072
                                                                                                              • Opcode Fuzzy Hash: e132c0b867aa7eef5382ae29dc0c53c517d243434872ddc09848389ce50e4e3b
                                                                                                              • Instruction Fuzzy Hash: BF5204B4A01228CFCB64DB34E85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 59864547636026a77c17383c311cd16ad5bbd78e9c5c0fca8da6d5cb2529eb81
                                                                                                              • Instruction ID: 4097ad88df82dda7e1eeeaec8430a18003752af22ffe5b3433b677e289d123a4
                                                                                                              • Opcode Fuzzy Hash: 59864547636026a77c17383c311cd16ad5bbd78e9c5c0fca8da6d5cb2529eb81
                                                                                                              • Instruction Fuzzy Hash: D052F5B4A11228CFCB64DB34D89869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: ad597417340b4634680d28d6c2b67909a98cc68517e33f929fd0f1b9b89620ff
                                                                                                              • Instruction ID: 106c858e7e576b403702f9f730ee73dda6916e1458529defa26ba453029fa28f
                                                                                                              • Opcode Fuzzy Hash: ad597417340b4634680d28d6c2b67909a98cc68517e33f929fd0f1b9b89620ff
                                                                                                              • Instruction Fuzzy Hash: E342F5B4A11228CFCB64DB34E85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: d6376da7298f80a4f61a15125c21c2c584e2530d6aa8337d0a847559097cf764
                                                                                                              • Instruction ID: 60cc90923989296d697d9c6220ccea9108f175f63692380c7dc216fe2e31108d
                                                                                                              • Opcode Fuzzy Hash: d6376da7298f80a4f61a15125c21c2c584e2530d6aa8337d0a847559097cf764
                                                                                                              • Instruction Fuzzy Hash: 7F42F5B4A01228CFCB64DB34D85869DB7B6BF89305F2084EAD50AA3344DF359E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 4567539f0e628efe5bc16d976b6914df094027bf43682c4678d2b32e608a9870
                                                                                                              • Instruction ID: da3eb8e4bf1614d9e231094c935af7a39c1a8f95cf1eda26a55e96c20ea98e13
                                                                                                              • Opcode Fuzzy Hash: 4567539f0e628efe5bc16d976b6914df094027bf43682c4678d2b32e608a9870
                                                                                                              • Instruction Fuzzy Hash: ED42F5B4A11228CFCB64DB34D85869DB7B6BF89305F2084EAD50AA3344DF399E81CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 3ccfe2bb9b467431585a5973198f1efcac49849ec9795806754e863dfea4afcf
                                                                                                              • Instruction ID: 3fef792b14e8e8795b6583a465611bcfbe39e0b123e3a6d5e7a2df038e0015a9
                                                                                                              • Opcode Fuzzy Hash: 3ccfe2bb9b467431585a5973198f1efcac49849ec9795806754e863dfea4afcf
                                                                                                              • Instruction Fuzzy Hash: 3542F6B4A11228CFCB64DB34D85869DB7B6BF88305F2084EAD509A3344DF399E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 58539016d6da8262aeedee644eea69cdc9d23a28e9c66e18b35f1dc75745332f
                                                                                                              • Instruction ID: b3038e42664b7e79b51d50199235eec37c9c40f44064b0beab4aa705373c826e
                                                                                                              • Opcode Fuzzy Hash: 58539016d6da8262aeedee644eea69cdc9d23a28e9c66e18b35f1dc75745332f
                                                                                                              • Instruction Fuzzy Hash: FD42F5B4A11228CFCB64DB34D85869DB7B6BF88305F2084EAD50AA3344DF399E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 6e1efe220c32ea55d5c1f9ce267778ff65206e9c2bcf317f0f91cf21bcc6089c
                                                                                                              • Instruction ID: d396641ee8a7d7e3b7f7f2707c45df7fadccb0aab744037b522c6ba5753cc6cf
                                                                                                              • Opcode Fuzzy Hash: 6e1efe220c32ea55d5c1f9ce267778ff65206e9c2bcf317f0f91cf21bcc6089c
                                                                                                              • Instruction Fuzzy Hash: BE42F6B4A11228CFCB64DB34D85869DB7B6BF88305F2085EAD50AA3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: ad7915d7c212bee154cbe80c73a9d85a036758ded0a9c96b5d7895a0f3b0b551
                                                                                                              • Instruction ID: 5223b7a6ec9449697542cea473d2e29b81695c3cd6f160af78efc54ba5e8532c
                                                                                                              • Opcode Fuzzy Hash: ad7915d7c212bee154cbe80c73a9d85a036758ded0a9c96b5d7895a0f3b0b551
                                                                                                              • Instruction Fuzzy Hash: D042F6B4A11228CFCB64DB74D85869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 202af292bfd36081124088e253bf0c71cca69b708499b0867c8df08de232ac22
                                                                                                              • Instruction ID: 578b7181c8bec6e3ba8fcc386cfd9bb0a89f955a1bcc330c308d1a59e7301bf2
                                                                                                              • Opcode Fuzzy Hash: 202af292bfd36081124088e253bf0c71cca69b708499b0867c8df08de232ac22
                                                                                                              • Instruction Fuzzy Hash: AA32F6B4A11228CFCB64DB74D89869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 473db7af21ac07135d3c818696b5e962456569231769c9b261583308fcdb1389
                                                                                                              • Instruction ID: f925975a5cad41ff5e56b4af09dcd489f5d9effd93117442758d182ba8de5100
                                                                                                              • Opcode Fuzzy Hash: 473db7af21ac07135d3c818696b5e962456569231769c9b261583308fcdb1389
                                                                                                              • Instruction Fuzzy Hash: 2D3206B4A11228CFCB64DB34D85869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: a96c0844af7d92aa918500ad369e30d7078e61f6f517eeea29a6e7bc9f333d02
                                                                                                              • Instruction ID: 0fa10de5d811ec1201e0890b29ff251602f59980bbaeea61ef4334f176466f53
                                                                                                              • Opcode Fuzzy Hash: a96c0844af7d92aa918500ad369e30d7078e61f6f517eeea29a6e7bc9f333d02
                                                                                                              • Instruction Fuzzy Hash: EF3206B4A01228CFCB64DB74D89869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 63b10cd119276fb3535d1b932ff9e852adf0755915af23bc28d983f99cc0e2a5
                                                                                                              • Instruction ID: 4e9a4db8b9a5074cb507d422a7145ee739f824aea7a6116bf9b8477efd1182f0
                                                                                                              • Opcode Fuzzy Hash: 63b10cd119276fb3535d1b932ff9e852adf0755915af23bc28d983f99cc0e2a5
                                                                                                              • Instruction Fuzzy Hash: B03207B4A01228CFCB64EB34D85869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: f2395255e511f735c4daecb006f841f7dad3f87312fcbd1304e60b314c23ab31
                                                                                                              • Instruction ID: 9f1251c5042e21983ea7519c2ac7f8baec5fc22a144acd68b730f1ea0f94e155
                                                                                                              • Opcode Fuzzy Hash: f2395255e511f735c4daecb006f841f7dad3f87312fcbd1304e60b314c23ab31
                                                                                                              • Instruction Fuzzy Hash: 3F32F7B4A11228CFCB64DB34D89869DB7B6BF88305F2084EAD509A3344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: aa25f795346c8130871d448db68342371648786bcfb54d3c36c5a503a6559289
                                                                                                              • Instruction ID: 1d77a7ceb12294870dfbccab29c99f41dd5a1ad585aa58f206045b368fcedb88
                                                                                                              • Opcode Fuzzy Hash: aa25f795346c8130871d448db68342371648786bcfb54d3c36c5a503a6559289
                                                                                                              • Instruction Fuzzy Hash: 7032F7B4A11228CFCB64EB34D85869DB7B6BF88305F2084EAD509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: d2bbe421944dfc46c601b7e87d031d259273348bbdf2281f7253af8aee9be0cd
                                                                                                              • Instruction ID: edbb423845eddeec8ccab8d7415ac478c9b05177093976109813f5cede8a400e
                                                                                                              • Opcode Fuzzy Hash: d2bbe421944dfc46c601b7e87d031d259273348bbdf2281f7253af8aee9be0cd
                                                                                                              • Instruction Fuzzy Hash: F82208B4A11228CFCB64DB34D85869DB7B6BF88305F2084EAD509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: e5ca83e6ff80380b016def645c064e0530ac5b39e3bbbd72c65a39d2bd1d760a
                                                                                                              • Instruction ID: 7597c4bd64466a05bb9df1b4e0b57a767ed68910f15a103a385b43d63c12d0ee
                                                                                                              • Opcode Fuzzy Hash: e5ca83e6ff80380b016def645c064e0530ac5b39e3bbbd72c65a39d2bd1d760a
                                                                                                              • Instruction Fuzzy Hash: 122208B4A01228CFCB64EB34D89869DB7B6BF88305F2084E9D509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 260a92b9262e78add8b0afe3eb8222171fba99f702e75763c167a774581c8866
                                                                                                              • Instruction ID: f632274cc55d2ed1330f019397eb8a1b53e9677d2bd48fbc4e7aed1d76d14b7c
                                                                                                              • Opcode Fuzzy Hash: 260a92b9262e78add8b0afe3eb8222171fba99f702e75763c167a774581c8866
                                                                                                              • Instruction Fuzzy Hash: 4D22F7B4A11228CFCB64EB34D89869DB7B6BF88305F2084E9D509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 398d5f62654110662b7ff68ef32fc7877207dfbd3956237a4e78916d724f4189
                                                                                                              • Instruction ID: ce3f94a206e10768a47a5f5d52b4e85cf11a3d2073e32fdeb51f4d0d87a5aa88
                                                                                                              • Opcode Fuzzy Hash: 398d5f62654110662b7ff68ef32fc7877207dfbd3956237a4e78916d724f4189
                                                                                                              • Instruction Fuzzy Hash: 1722F7B4A01228CFCB64EB74D89869DB7B6BF88305F2084E9D509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21164
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: d9fd58da77fcf72908eb92195355849e8086d436fba722bc0522d996fe4bdec0
                                                                                                              • Instruction ID: f4e7825a27474d519cab6c6e7b40f0e9b6338e9a121dfe37a98bfd71c387deb7
                                                                                                              • Opcode Fuzzy Hash: d9fd58da77fcf72908eb92195355849e8086d436fba722bc0522d996fe4bdec0
                                                                                                              • Instruction Fuzzy Hash: 9F2207B4A01228CFCB64EB74D89869DB7B6BF88305F2084E9D509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 028A69A0
                                                                                                              • GetCurrentThread.KERNEL32 ref: 028A69DD
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 028A6A1A
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 028A6A73
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: f870ca8e7e83a8c343d846413b84c23467b440ddcb36b020eec9870973193d43
                                                                                                              • Instruction ID: f6484f1802d8f51e5681f7657ca6d12d89b48797aba3ebc0a8b55f5d28b4059b
                                                                                                              • Opcode Fuzzy Hash: f870ca8e7e83a8c343d846413b84c23467b440ddcb36b020eec9870973193d43
                                                                                                              • Instruction Fuzzy Hash: 235158B8E002498FDB14CFAAD64879EBBF4FF88314F248459E109A7350DB749948CB61
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • LdrInitializeThunk.NTDLL ref: 00E212D7
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser$InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2638914809-0
                                                                                                              • Opcode ID: 4829de5cc3967613b623f0ed484748aaa842be2ed87dffd988eefcac603174cd
                                                                                                              • Instruction ID: d10aaafd769c46ec93b84f0c4400bc849236a23f17e7d61747da68c362605e4f
                                                                                                              • Opcode Fuzzy Hash: 4829de5cc3967613b623f0ed484748aaa842be2ed87dffd988eefcac603174cd
                                                                                                              • Instruction Fuzzy Hash: 771207B4A01229CFCB64EB34D89869DB7B6BF88305F2084E9D509A7344DF399E85CF54
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: 021865c2d7a6cefdcdf911428b80c6f9d4a15b89e7219d2c68972daa9b806779
                                                                                                              • Instruction ID: cc34d11ca9b6dee0936531be74772644f75bf1b20d4dec73f306dec77ade1e16
                                                                                                              • Opcode Fuzzy Hash: 021865c2d7a6cefdcdf911428b80c6f9d4a15b89e7219d2c68972daa9b806779
                                                                                                              • Instruction Fuzzy Hash: 9FD11AB4A01228CFCB24DB24D89879DB7B6BF89305F6084EAD609A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: f144135a1e642af894e470684e1c0ebab598bb53a3a5f7002a447700f2575aec
                                                                                                              • Instruction ID: b244b6f5a0a41160874102377a3819a56539cd6cfacee61f59269edef9910429
                                                                                                              • Opcode Fuzzy Hash: f144135a1e642af894e470684e1c0ebab598bb53a3a5f7002a447700f2575aec
                                                                                                              • Instruction Fuzzy Hash: 00C11CB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9D609A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E216DB
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: a338aba1958312a8f8a49f5708b9dffa796074880f4c3f132417c0f26122c2f4
                                                                                                              • Instruction ID: 22966afd0bb95ed0f332a438bf7fdfecc746922ab46b2dab760563912fe0db95
                                                                                                              • Opcode Fuzzy Hash: a338aba1958312a8f8a49f5708b9dffa796074880f4c3f132417c0f26122c2f4
                                                                                                              • Instruction Fuzzy Hash: 68C11BB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: 8a710e4f4a909332974ea08bcb3cf06c070246db18b16916215b08f9f6327f7b
                                                                                                              • Instruction ID: a39bd223b194dbfc3686bda2c8b52a86b726925664bab7b048bae8094930423a
                                                                                                              • Opcode Fuzzy Hash: 8a710e4f4a909332974ea08bcb3cf06c070246db18b16916215b08f9f6327f7b
                                                                                                              • Instruction Fuzzy Hash: 8CC10BB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: ab4c9ffd92396afd62f45781448d97e008d84594ca369458ae16f353a2d06629
                                                                                                              • Instruction ID: f32632f4c9a060ada201e7669a8400143310bca2eca88642b68b89e55945c5ae
                                                                                                              • Opcode Fuzzy Hash: ab4c9ffd92396afd62f45781448d97e008d84594ca369458ae16f353a2d06629
                                                                                                              • Instruction Fuzzy Hash: 49B11BB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: 34ea337e24c11ff1b2c1dfbbae4a889bbce23bb73176eb97968a76d31a3a9333
                                                                                                              • Instruction ID: 6b7d4c38ed3a23ffb6c041d81c632a1b6ebcc72974adbe2d7deca5c0e2414aa8
                                                                                                              • Opcode Fuzzy Hash: 34ea337e24c11ff1b2c1dfbbae4a889bbce23bb73176eb97968a76d31a3a9333
                                                                                                              • Instruction Fuzzy Hash: 0FB11BB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: f06eb8101fd163782395b8de0943c8250763eea5d6ebb7ac5036b32ff895e855
                                                                                                              • Instruction ID: d5de78f355cf21f4415daf4498dd3da4e45a0a2129909aade817ab497fb3e88b
                                                                                                              • Opcode Fuzzy Hash: f06eb8101fd163782395b8de0943c8250763eea5d6ebb7ac5036b32ff895e855
                                                                                                              • Instruction Fuzzy Hash: B7B11AB4A01228CFCB64DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: 1d00e0032be3b172981df7ee605d1bc180b114b49c845b02a0975e9ebab3cb0d
                                                                                                              • Instruction ID: 24e9e7de04d501b7e4c733af9e4ffdec9ef277543358a99cecf5462506acc83a
                                                                                                              • Opcode Fuzzy Hash: 1d00e0032be3b172981df7ee605d1bc180b114b49c845b02a0975e9ebab3cb0d
                                                                                                              • Instruction Fuzzy Hash: 05A12CB4A01228CFCB24DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • KiUserExceptionDispatcher.NTDLL ref: 00E21867
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.462982151.0000000000E20000.00000040.00000001.sdmp, Offset: 00E20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DispatcherExceptionUser
                                                                                                              • String ID:
                                                                                                              • API String ID: 6842923-0
                                                                                                              • Opcode ID: a326c3e3fe8acff930e0d33416cfa3e5e756155491c9598c1888d27600116c90
                                                                                                              • Instruction ID: c5877772c53ab464e3ecd28439b4295e8659fbb9f1b5c41c0bc3d7e60a8467ea
                                                                                                              • Opcode Fuzzy Hash: a326c3e3fe8acff930e0d33416cfa3e5e756155491c9598c1888d27600116c90
                                                                                                              • Instruction Fuzzy Hash: 9BA13CB4A11228CFCB24DB24D89879DB7B6BF88305F6084E9DA09A7340DF359E85CF55
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b579e533fb7d27b35f1c4a6a284f99465c80811386ce3b171268abf25d55fb9b
                                                                                                              • Instruction ID: f25d8655cde4527eb9de5e6caff8f5270c8fa66b89d46b4ac01ef3e8c894d3ed
                                                                                                              • Opcode Fuzzy Hash: b579e533fb7d27b35f1c4a6a284f99465c80811386ce3b171268abf25d55fb9b
                                                                                                              • Instruction Fuzzy Hash: 0341F571E043968FCB11CFA9C8142EEBBF5EF89314F0585AAD504EB241DB749985CBD1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 028A51A2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: e46ca8483dbf7265bb46dedce5b04373ce1148fe9c9b629d9858d5152270d81b
                                                                                                              • Instruction ID: 6efc487942149220568db19e046eea603ab4c145120ae5a3692ba78e0adf67da
                                                                                                              • Opcode Fuzzy Hash: e46ca8483dbf7265bb46dedce5b04373ce1148fe9c9b629d9858d5152270d81b
                                                                                                              • Instruction Fuzzy Hash: 8551D0B5D003489FDF14CFA9C884ADEBBB5BF48314F64812AE819AB210DB749985CF90
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 028A51A2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: e0ff8a4e12e08f231297d6ee58f556a14947efe48fd756bf840dc0694393d501
                                                                                                              • Instruction ID: 3849c41e7fd4d014ff3e00b50fb33edfcfc609f286b3ffbccd2422d2b158ab82
                                                                                                              • Opcode Fuzzy Hash: e0ff8a4e12e08f231297d6ee58f556a14947efe48fd756bf840dc0694393d501
                                                                                                              • Instruction Fuzzy Hash: 1041C1B5D003489FDF14CF99C894ADEBBB5BF48314F64812EE819AB210DB749985CF90
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 028A7F09
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: CallProcWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 2714655100-0
                                                                                                              • Opcode ID: eff5d1d16bd917f7a1a44473c234164f4f4528585182c4b36aeefaf9208a97f6
                                                                                                              • Instruction ID: bde1a9d828f23a998c88768b2c19eb5a491fc567d293dbee70c641ee4307e268
                                                                                                              • Opcode Fuzzy Hash: eff5d1d16bd917f7a1a44473c234164f4f4528585182c4b36aeefaf9208a97f6
                                                                                                              • Instruction Fuzzy Hash: 9E414BB9A002498FDB14CF99C488AAEFBF5FF88314F148499E519AB311D774A945CFA0
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 028A6BEF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: e72c6ce48fa9c039c051bc19d51fe9a7f1191de2e95e48c5b8132f6966d90cce
                                                                                                              • Instruction ID: 773b80ca52b21d8ea8f8339d39418bff78064ef4607007ec5a9e91d78ba892f8
                                                                                                              • Opcode Fuzzy Hash: e72c6ce48fa9c039c051bc19d51fe9a7f1191de2e95e48c5b8132f6966d90cce
                                                                                                              • Instruction Fuzzy Hash: 4C21F3B5D002589FDF10CFAAD984ADEBBF8FB48324F14841AE914A7310D778A944CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 028A6BEF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 58b8d23e8f113b691a09a2e486728c838ccd0a3cd44001204a28634720838171
                                                                                                              • Instruction ID: 53c8fa20ae9a6f7e3c25dfa6d7840bf7103c57198fd7257ad9dc1e732936562e
                                                                                                              • Opcode Fuzzy Hash: 58b8d23e8f113b691a09a2e486728c838ccd0a3cd44001204a28634720838171
                                                                                                              • Instruction Fuzzy Hash: EC2100B59002489FDB10CFAAD584AEEBBF8EB48324F14801AE954A7310D778A945CF60
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • SetWindowsHookExW.USER32(0000000D,00000000,?,?), ref: 00E92AE3
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HookWindows
                                                                                                              • String ID:
                                                                                                              • API String ID: 2559412058-0
                                                                                                              • Opcode ID: 579674aad607f31dc04ab8a8287a4ae95033eb383a3c3ecac47bc5838d850602
                                                                                                              • Instruction ID: 14d598ff3e076c36494baa00b9e765adef55d1e6cd157ffb7973ee7ef2ed2f51
                                                                                                              • Opcode Fuzzy Hash: 579674aad607f31dc04ab8a8287a4ae95033eb383a3c3ecac47bc5838d850602
                                                                                                              • Instruction Fuzzy Hash: 4A2115B1D002199FCB50CF9AD844BEEBBF5EB88324F10842DE419A7350CBB4A945CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 028ABF12
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: EncodePointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2118026453-0
                                                                                                              • Opcode ID: 229cc6fa9ce174bc8e368be0ab39f64feac5c105ecf274bd1253820800c45189
                                                                                                              • Instruction ID: 868d5a3a9c1573877bddf2e0ac39f4a720bcaa4bdbdf1324e1d0ac4c41bec692
                                                                                                              • Opcode Fuzzy Hash: 229cc6fa9ce174bc8e368be0ab39f64feac5c105ecf274bd1253820800c45189
                                                                                                              • Instruction Fuzzy Hash: C7216DBAD013058FDB10DFAAD54879EBBF5FB58328F14852AD409E7600DB39A505CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00E9DFA9,00000800), ref: 00E9E03A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID:
                                                                                                              • API String ID: 1029625771-0
                                                                                                              • Opcode ID: d3afd7276e22d6c87a08afce03b75911ba666f97f4d55ff6a51d72f2d1e93a70
                                                                                                              • Instruction ID: 3a18d659ca5758ac1e44c60af39b32a855a1e01d953332c6ea221ed02cc030f5
                                                                                                              • Opcode Fuzzy Hash: d3afd7276e22d6c87a08afce03b75911ba666f97f4d55ff6a51d72f2d1e93a70
                                                                                                              • Instruction Fuzzy Hash: DC1103B69042089FDB10CF9AC444BDEBBF4EB98324F14842EEA15B7700C7B5A945CFA5
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00E90FBA), ref: 00E910A7
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: GlobalMemoryStatus
                                                                                                              • String ID:
                                                                                                              • API String ID: 1890195054-0
                                                                                                              • Opcode ID: 122368d8cbc2ccc63deee4f419624c3caea056d8d6135051f3875b5051fb9475
                                                                                                              • Instruction ID: 97ba88a98d62d3e234f7d329a19261db10ec194f87cfbd13d11ad8e5d45479a7
                                                                                                              • Opcode Fuzzy Hash: 122368d8cbc2ccc63deee4f419624c3caea056d8d6135051f3875b5051fb9475
                                                                                                              • Instruction Fuzzy Hash: 051103B1D0065A9BCB10CF9AC4447EEFBF4AB48324F15816AD818B7340D779A944CFE5
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00E9DFA9,00000800), ref: 00E9E03A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463139025.0000000000E90000.00000040.00000001.sdmp, Offset: 00E90000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: LibraryLoad
                                                                                                              • String ID:
                                                                                                              • API String ID: 1029625771-0
                                                                                                              • Opcode ID: 195500a4767130875094def0924d84f99e568d492626dd41ce046870fe418ad5
                                                                                                              • Instruction ID: 8bd259750bb356c67aa958b9a77cbb74508eef0bcf56b26b16409b139d86f568
                                                                                                              • Opcode Fuzzy Hash: 195500a4767130875094def0924d84f99e568d492626dd41ce046870fe418ad5
                                                                                                              • Instruction Fuzzy Hash: 371144B2D002488FCB10CFAAD484ADEFBF4AB88324F00852ED525B7340C7B4A945CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 028ABF12
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: EncodePointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2118026453-0
                                                                                                              • Opcode ID: 2c56fbb9c22ace13c0a2ff68921626e6ee1acc43c480d25f156ddd207ae1e331
                                                                                                              • Instruction ID: 42f360e0599e344e47070c7f370fbe2d2894d560e827c9b17fb08e6a50a7fc0f
                                                                                                              • Opcode Fuzzy Hash: 2c56fbb9c22ace13c0a2ff68921626e6ee1acc43c480d25f156ddd207ae1e331
                                                                                                              • Instruction Fuzzy Hash: 28119AB9D013088FDB10DFAAD50879EBBF5EB58328F24852ED409E3600DB39A544CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 028A4116
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 8eea7e263f04747228a8c217a287ba865da2048ebc28096c432e3521f94d08f5
                                                                                                              • Instruction ID: d36a3ba18bcb4135ec6b233fd3d64646fa7b4387ae1e8472a7e724e28a8e7340
                                                                                                              • Opcode Fuzzy Hash: 8eea7e263f04747228a8c217a287ba865da2048ebc28096c432e3521f94d08f5
                                                                                                              • Instruction Fuzzy Hash: 221102B9D006498FDB10CF9AC444BDEFBF4EB89224F10842ED929B7200D7B4A549CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 028A4116
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.464046510.00000000028A0000.00000040.00000001.sdmp, Offset: 028A0000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: def694be6bdd25cb7e300237ad7bd2d7040900737007c207402eabba4cd8cd30
                                                                                                              • Instruction ID: 989dc50d84334f71c6d977da717f5d0bb3909d5abba44bd83095901888897f7c
                                                                                                              • Opcode Fuzzy Hash: def694be6bdd25cb7e300237ad7bd2d7040900737007c207402eabba4cd8cd30
                                                                                                              • Instruction Fuzzy Hash: DD11F0B9D006498FDB10CF9AC444BDEFBF4EB89324F11846AD429B7600D7B9A546CFA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463408435.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 1b395ec12fe53e1875112ffe00a24de4ceaf1a7e9189a96b157a6f756d14134d
                                                                                                              • Instruction ID: bd650483a381e91351a94155ef0f7cf0607ac03895e6a9fe1f0b9591b9fb3346
                                                                                                              • Opcode Fuzzy Hash: 1b395ec12fe53e1875112ffe00a24de4ceaf1a7e9189a96b157a6f756d14134d
                                                                                                              • Instruction Fuzzy Hash: 102148B1508248DFCB01DF10DCC0B77BF66FB88328F208569EA055B206C336E845D7A1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463408435.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7c56ff57ae90b965b0c2f01648aa2e765a949b3633cbfd5315b25c38434a4968
                                                                                                              • Instruction ID: f87bda829779af1dfbf62c0176eb9c0a20853635199a31aa429c664916b1ef77
                                                                                                              • Opcode Fuzzy Hash: 7c56ff57ae90b965b0c2f01648aa2e765a949b3633cbfd5315b25c38434a4968
                                                                                                              • Instruction Fuzzy Hash: 7C2128B1508248DFCB01DF14DDC0B66BF66FB9432CF248569EA055B246C336D856D7A1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463484405.000000000101D000.00000040.00000001.sdmp, Offset: 0101D000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 46940ee1c4bc900d86f8395c48637bef844811b9bb731d12619d230f28360870
                                                                                                              • Instruction ID: f07f0264b7ff29b44efb72e68bb52b96938aa3cbbd6beab615443cdc89823d46
                                                                                                              • Opcode Fuzzy Hash: 46940ee1c4bc900d86f8395c48637bef844811b9bb731d12619d230f28360870
                                                                                                              • Instruction Fuzzy Hash: 66212575504340DFCB16CF94D8C8B16BBA5FB84354F20C9ADE9894B24AC33BD846CB62
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463408435.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0d8a9d817077d39d9fad6da2ff2e5526acd16db30dd6086573c8171f784580f2
                                                                                                              • Instruction ID: aef50f767e573a98830dcf3090d20a93321097b3172321e303141e924b6ad7fc
                                                                                                              • Opcode Fuzzy Hash: 0d8a9d817077d39d9fad6da2ff2e5526acd16db30dd6086573c8171f784580f2
                                                                                                              • Instruction Fuzzy Hash: 2C11B176408284DFCB11CF10D9C4B26BF72FB94328F2486A9D9051B656C336D85ACBA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463408435.0000000000EFD000.00000040.00000001.sdmp, Offset: 00EFD000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0d8a9d817077d39d9fad6da2ff2e5526acd16db30dd6086573c8171f784580f2
                                                                                                              • Instruction ID: c2065121cec8575f542a58c59f6c7b68fe58840b1dec90cadccbb99c104c7882
                                                                                                              • Opcode Fuzzy Hash: 0d8a9d817077d39d9fad6da2ff2e5526acd16db30dd6086573c8171f784580f2
                                                                                                              • Instruction Fuzzy Hash: A611E676408284DFCF02CF10D9C4B26BF72FB94328F24C6A9D9495B656C336D85ACBA1
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.463484405.000000000101D000.00000040.00000001.sdmp, Offset: 0101D000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 17adf84bf3d986228e54cd171d4c143f67dded3a97ef0c4bc82ee09b3a791334
                                                                                                              • Instruction ID: 02cf0feb5502ffc4a439af17ac832b06c3d53cd55c9e038d2c2d39ec38cd9f9d
                                                                                                              • Opcode Fuzzy Hash: 17adf84bf3d986228e54cd171d4c143f67dded3a97ef0c4bc82ee09b3a791334
                                                                                                              • Instruction Fuzzy Hash: FF118E75504280DFDB12CF54D5C8B16BFA1FB44314F24C6AAE8494B65AC33AD44ACB62
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%

                                                                                                              Non-executed Functions

                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000005.00000002.470043210.0000000006A20000.00000040.00000001.sdmp, Offset: 06A20000, based on PE: false
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: @C$@C$@C$@C
                                                                                                              • API String ID: 0-202337559
                                                                                                              • Opcode ID: 8672c8203baea5cc7d72a5223f8327da31ee7f4dd6b1df5b41e472cf4b90e4e1
                                                                                                              • Instruction ID: 204d9c8d9a5a7180fb3faa004c8f3778ffb24ab5952ef0124a8aaa7d3204aecd
                                                                                                              • Opcode Fuzzy Hash: 8672c8203baea5cc7d72a5223f8327da31ee7f4dd6b1df5b41e472cf4b90e4e1
                                                                                                              • Instruction Fuzzy Hash: 60F18D30E4021ACFDB54EFA9C944BADBBF1BF85304F158468E409AF2A5DB74E945CB90
                                                                                                              Uniqueness

                                                                                                              Uniqueness Score: -1.00%